Our Recommendations :-
Follow CA Final FB Page

Major boundary control techniques ?

Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Anil Dhawan asked over 2 years ago

    0       0 Answer Now Comment Report
4 Answers
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 CA Sandeep Bohra answered about 2 years ago

> Major boundary control techniques ? --Major Boundary Control techniques are given as follows: •Cryptography: It deals with programs for transforming data into cipher text that are meaningless to anyone, who does not possess the authentication to access the respective system resource or file. A cryptographic technique encrypts data (clear text) into cryptograms (cipher text) and its strength depends on the time and cost to decipher the cipher text by a cryptanalyst. Three techniques of cryptography are transposition (permute the order of characters within a set of data), substitution (replace text with a key-text) and product cipher (combination of transposition and substitution). •Passwords: User identification by an authentication mechanism norm ally with strong password may be a good boundary access control. A few best practices followed to avoid failures in this control system are; minimum password length, avoid usage of common dictionary words, periodic change of passwords, hashing of passwords and number of unsuccessful entry attempts.

    0       0 Comment Report
Important Note – Preparing for CA Final?
CAKART provides Indias top faculty each subject video classes and lectures – online & in Pen Drive/ DVD – at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below – 
For any questions Request A Call Back  
Open uri20170510 32134 59004f?1494421790 Anshul Dhawan answered over 2 years ago

Major Boundary Control techniques are given as follows: •Cryptography: It deals with programs for transforming data into cipher text that are meaningless to anyone, who does not possess the authentication to access the respective system resource or file. A cryptographic technique encrypts data (clear text) into cryptograms (cipher text) and its strength depends on the time and cost to decipher the cipher text by a cryptanalyst. Three techniques of cryptography are transposition (permute the order of characters within a set of data), substitution (replace text with a key-text) and product cipher (combination of transposition and substitution). •Passwords: User identification by an authentication mechanism norm ally with strong password may be a good boundary access control. A few best practices followed to avoid failures in this control system are; minimum password length, avoid usage of common dictionary words, periodic change of passwords, hashing of passwords and number of unsuccessful entry attempts. •Personal Identification Numbers (PIN): PIN is similar to a password. It is assigned to a user by an institution using a random number stored in its database and sent independently to a user after identification. It can also be a customer selected number. Hence, a PIN may be exposed to vulnerabilities while issuance or delivery, validation, transmission and storage.

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Pankaj answered over 2 years ago

Major Boundary Control techniques are given as follows: •Cryptography: It deals with programs for transforming data into cipher text that are meaningless to anyone, who does not possess the authentication to access the respective system resource or file. A cryptographic technique encrypts data (clear text) into cryptograms (cipher text) and its strength depends on the time and cost to decipher the cipher text by a cryptanalyst. Three techniques of cryptography are transposition (permute the order of characters within a set of data), substitution (replace text with a key-text) and product cipher (combination of transposition and substitution). •Passwords: User identification by an authentication mechanism norm ally with strong password may be a good boundary access control. A few best practices followed to avoid failures in this control system are; minimum password length, avoid usage of common dictionary words, periodic change of passwords, hashing of passwords and number of unsuccessful entry attempts. •Personal Identification Numbers (PIN): --------------------------------------- PIN is similar to a password. It is assigned to a user by an institution using a random number stored in its database and sent independently to a user after identification. It can also be a customer selected number. Hence, a PIN may be exposed to vulnerabilities while issuance or delivery, validation, transmission and storage. • Identification Cards: --------------------- Identification cards are used to store information required in an authentication process. These cards are to be controlled through the application for a card, preparation of the card, issue, use and card return or card termination phases. •Biometric Devices: ------------------- Biometric identification e.g. thumb and/or finger impression, eye retina etc. are also used as boundary control techniques.

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Chirag answered over 2 years ago

**Boundary Controls:** The major controls of the boundary system are the access control mechanisms. Access control mechanism links authentic users to resources, they are permitted to access. The access control mechanism has three steps of identification, authentication and authorization with respect to the access control policy. **Major Boundary Control techniques are given as follows:** •**Cryptography:** It deals with programs for transforming data into cipher text that are meaningless to anyone, who does not possess the authentication to access the respective system resource or file. A cryptographic technique encrypts data (clear text) into cryptograms (cipher text) and its strength depends on the time and cost to decipher the cipher text by a cryptanalyst. Three techniques of cryptography are transposition (permute the order of characters within a set of data), substitution (replace text with a key-text) and product cipher (combination of transposition and substitution). •**Passwords:** User identification by an authentication mechanism norm ally with strong password may be a good boundary access control. A few best practices followed to avoid failures in this control system are; minimum password length, avoid usage of common dictionary words, periodic change of passwords, hashing of passwords and number of unsuccessful entry attempts. •**Personal Identification Numbers (PIN):** PIN is similar to a password. It is assigned to a user by an institution using a random number stored in its database and sent independently to a user after identification. It can also be a customer selected number. Hence, a PIN may be exposed to vulnerabilities while issuance or delivery, validation, transmission and storage. •**Identification Cards:** Identification cards are used to store information required in an authentication process. These cards are to be controlled through the application for a card, preparation of the card, issue, use and card return or card termination phases. •**Biometric Devices:** Biometric identification e.g. thumb and/or finger impression, eye retina etc. are also used as boundary control techniques.

    0       1 Comment Report
Get Notifications
Videos
Books
Notes
Loading
SIGN UP
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.