We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
Lecture 3: OSI Security Architecture
Network SecurityTable of Contents
e OSI Security Architecture
e 4 Common Attacks
e Handling Attacks
e ExerciseOSI Security Architecture
= An international and systematic standard of
defining and providing security requirements.
» Used by IT managers and vendors in their
products
= Proposed by ITU-T in recommendations X.800
as “Security Architecture for OSI”
¢ security attack
e security mechanism (control)
A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a any attack.
¢ security service
enhances the security of the data processing systems and the
information transfers of an organizationSecurity Mechanisms (X.800)
e Specific Security Mechanisms:
¢ encipherment, digital signatures, access controls, data
integrity, authentication exchange, traffic padding,
routing control, notarization
e Pervasive Security Mechanisms:
e trusted functionality, security labels, event detection,
security audit trails, security recovery4 Common Types of Threats
eo®
Information Information
ct destination
(a) Normal flow
(b) Interray ption () Interception
(@) Modification (e) Fabrication4 Common Types of Threats (2)
Confidentiality
Integrity
Availability
Authenticity
Threats
Interception
— Unauthorized access
— wiretapping
Modification
— Change or Delete: Data,
Messages, Programs
Interruption
— Hardware destruction
— Disable File Management
Fabrication
— Create data, messages ...Handling Attacks
e Passive attacks — focus on Prevention
Easy to stop
Hard to detect
e Active attacks — focus on Detection and
Recovery
Hard to stop
Easy to detectExercise
1. What is the OSI security architecture?
2. What is the difference between passive and active
security threats?
3. List and briefly define categories of passive and
active security attacks.
4. List and briefly define categories of security
services.
5. List and briefly define categories of security
mechanisms.