Security Services
These are two main categories of security services
RFC 2828 It defines as a processing or communication service provided by a system to give a specific kind of protection to system resources.
X.800 It defines as a service provided by a protocol layer communicating open systems, which ensures adequate security of systems or of data transfers.
X.800 Classification
- 800 defines it in five major categories
- Authentication Assurance that the communicating is the one clam–
- Access Control Prevention of the unauthorised use of resources.
- Data Confidentiality Protection of data from unauthwised
- Data integrity Assurance that data received is as sent by as authorized entity.
- Non-Repudiation Protection against denial by one of the
Communication.
Security Mechanism
Feature desisgned to detect, prevent or recover from security attack.
The Two categories of security mechanism are as follows.
Specific Security Mechanism
Encipherment digital signature, access control, data intergrity, authentication exchange, traffic padding, routing control, notarization.
Pervasive Security Mechanism
Treated functionality, security labels, event detection, security audit trails, security recovery.
Security Attacks
it is an action that compromises the security of information owned by an organisation.
These are two types of security attacks
Passive Attacks
Eavesdropping on or monitoring— of transmission to
- Obtain message contents 1 Monitor traffic flows
Active Attacks
In computer and computer network an attack is any attempt to destroy, expose, after, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Modification of data stream to
- Masquerade of one entity as some other
- Replay previous messages
- Modify messages in transit
- Denial of service
Model for Network Security
Network security starts with authenticating, commonly with a username and password. since, this requires just one detail authenticating the user name i.e., the password this is some times teamed one factor authentication.
Using this model require us to
- Design a suitable algorithm for the security transformation.
- Generate the secret in formations (keys) used by the algorithm.
- Develop methods to distribute and share the secret information.
- Specify a protocol enabling the principles to use the transformation and
secret information for security service.