0% found this document useful (0 votes)
42 views

1

The document discusses the OSI security architecture, including security attacks, services, and mechanisms. It defines passive and active security attacks and describes four categories of active attacks. It also defines security services such as authentication, access control, data confidentiality, data integrity, and nonrepudiation. Finally, it discusses security mechanisms like encipherment that are designed to detect, prevent, or recover from security attacks.

Uploaded by

Veeresh Mudvi
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

1

The document discusses the OSI security architecture, including security attacks, services, and mechanisms. It defines passive and active security attacks and describes four categories of active attacks. It also defines security services such as authentication, access control, data confidentiality, data integrity, and nonrepudiation. Finally, it discusses security mechanisms like encipherment that are designed to detect, prevent, or recover from security attacks.

Uploaded by

Veeresh Mudvi
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

The OSI Security architecture Security attacks Security services Security mechanism

A model for network security

The OSI security architecture focuses on security attacks, mechanisms, and services. Security attack:Any action that compromises the security of information owned by an organization. Two types of security attacks a) Passive attack b) active attack

Passive attack attempts to learn or make use of information from the system but does not affect system resources.
Two types of passive attacks are release of message contents and traffic analysis.

Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.

X.800 defines it is the service provided by protocol layer of communicating open system which ensures adequate security of the systems or of data transfers. RFC 2828 defines as a communication service that is provided by a system to give a specific kind of protection to system resources;

Authentication Access control Data confidentiality Data integrity Nonrepudiation

Is a process that is designed to detect, prevent or recover from a security attack. Encipherment : It uses a mathematical algorithm to transfer the data into a form that can not be read by unauthorized user. Two types: Reversible encipherment Irreversible encipherment

A security-related transformation on the information to be sent. Some secret information shared by the two principals and, it is hoped, unknown to the opponent.

You might also like