KEMBAR78
OSI Architecture Layers - Cryptography and Network Security | PDF
0% found this document useful (0 votes)
75 views8 pages

OSI Architecture Layers - Cryptography and Network Security

Uploaded by

Mahnoor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
75 views8 pages

OSI Architecture Layers - Cryptography and Network Security

Uploaded by

Mahnoor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
Lecture 3: OSI Security Architecture Network Security Table of Contents e OSI Security Architecture e 4 Common Attacks e Handling Attacks e Exercise OSI Security Architecture = An international and systematic standard of defining and providing security requirements. » Used by IT managers and vendors in their products = Proposed by ITU-T in recommendations X.800 as “Security Architecture for OSI” ¢ security attack e security mechanism (control) A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a any attack. ¢ security service enhances the security of the data processing systems and the information transfers of an organization Security Mechanisms (X.800) e Specific Security Mechanisms: ¢ encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization e Pervasive Security Mechanisms: e trusted functionality, security labels, event detection, security audit trails, security recovery 4 Common Types of Threats eo® Information Information ct destination (a) Normal flow (b) Interray ption () Interception (@) Modification (e) Fabrication 4 Common Types of Threats (2) Confidentiality Integrity Availability Authenticity Threats Interception — Unauthorized access — wiretapping Modification — Change or Delete: Data, Messages, Programs Interruption — Hardware destruction — Disable File Management Fabrication — Create data, messages ... Handling Attacks e Passive attacks — focus on Prevention Easy to stop Hard to detect e Active attacks — focus on Detection and Recovery Hard to stop Easy to detect Exercise 1. What is the OSI security architecture? 2. What is the difference between passive and active security threats? 3. List and briefly define categories of passive and active security attacks. 4. List and briefly define categories of security services. 5. List and briefly define categories of security mechanisms.

You might also like