Handbook of Computer Science(cs) and IT

Security Services

These are two main categories of security services

RFC 2828 It defines as a processing or communication service provided by a system to give a specific kind of protection to system resources.

X.800 It defines as a service provided by a  protocol layer communicating open systems, which ensures adequate security of systems or of data transfers.

X.800 Classification

  1. 800 defines it in five major categories
  • Authentication Assurance that the communicating is the one clam
  • Access Control Prevention of the unauthorised use of resources.
  • Data Confidentiality Protection of data from unauthwised
  • Data integrity Assurance that data received is as sent by as authorized entity.
  • Non-Repudiation Protection against denial by one of the

Communication.

 

Security Mechanism

Feature desisgned to detect, prevent or recover from security attack.

The Two categories of security mechanism are as follows.

Specific Security Mechanism

Encipherment digital signature, access control, data intergrity, authentication exchange, traffic padding, routing control, notarization.

 

Pervasive Security Mechanism

 

Treated functionality,  security labels, event detection,  security audit trails,  security recovery.

Security Attacks

it is an action that compromises the security of information owned by an organisation.

These are two types of security attacks

Passive Attacks

Eavesdropping on or monitoring— of transmission to

  • Obtain message contents 1 Monitor traffic flows

Active Attacks

In computer and computer network an attack is any attempt to destroy, expose, after, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Modification of data stream to

  • Masquerade of one entity as some other
  • Replay previous messages
  • Modify messages in transit
  • Denial of service

 

 

Model for Network Security

Network security starts with authenticating, commonly with a username and password. since, this requires just one detail authenticating the user name i.e., the password this is some times teamed one factor authentication.

 

Using this model require us to

  • Design a suitable algorithm for the security transformation.
  • Generate the secret in formations (keys) used by the algorithm.
  • Develop methods to distribute and share the secret information.
  • Specify a protocol enabling the principles to use the transformation and

secret information for security service.

Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95

Leave a Reply

Your email address will not be published. Required fields are marked *