KEMBAR78
Web Security Services and Mechanism.pptx
Security Fundamentals
Need for Security | Principles |
Services | Mechanisms
Need for Security
• Protect sensitive data (personal, financial, organizational)
• Ensure integrity of information
• Keep systems and services available
• Prevent unauthorized access or misuse
• Build trust among users
• Meet compliance and legal requirements
• Example: Online banking transactions
Principles of Security (CIA +)
• Confidentiality – Only authorized users can access data
• Integrity – Data must remain accurate and unchanged
• Availability – Resources must be accessible when needed
• Authentication – Verify identity
• Authorization – Grant appropriate access
• Non-repudiation – Cannot deny an action/transaction
• Accountability – Actions can be traced
OSI Security Architecture
• To assess effectively the security needs of an organization and to evaluate and
choose various security products and policies, the manager responsible for security
needs some systematic way of defining the requirements for security and
characterizing the approaches to satisfying those requirements. This is difficult
enough in a centralized data processing environment; with the use of local and
wide area networks, the problems are compounded.
• ITU-T Recommendation X.800, Security Architecture for OSI, defines such a
systematic approach. The open systems interconnection (OSI) security architecture
is useful to managers as a way of organizing the task of providing security.
Furthermore, because this architecture was developed as an international standard,
computer and communications vendors have developed security features for their
products and services that relate to this structured definition of services and
mechanisms. For our purposes, the OSI security architecture provides a useful, if
abstract, overview of many of the concepts that this book deals with
OSI Security
Architecture
Security
attack
Security
Services
Security
Mechanism
Security Services
Security Services (ISO 7498-2)
• Authentication – Prove identity
• Access Control – Restrict unauthorized users
• Data Confidentiality – Prevent data leakage
• Data Integrity – Detect changes in data
• Non-Repudiation – Proof of origin & delivery
• Availability Service – Reliable access to resources
Security Mechanism
Security Mechanisms
• Encryption – Protect confidentiality
• Digital Signatures – Authentication, integrity, non-repudiation
• Hash Functions – Verify data integrity
• Authentication Protocols – Passwords, OTPs, biometrics
• Access Control Lists (ACLs) – Define permissions
• Firewalls / IDS / IPS – Block & detect attacks
• Audit Logs – Track user actions
• Backups & Redundancy – Maintain availability
Example Diagram: Security Concepts Flow
Services
(Authentication,
Confidentiality, Integrity,
Availability)
Mechanisms
(Encryption, Hashing,
Firewalls, Logs)
Real-Life Case Studies
• Data Breach – Weak authentication → confidential data leaked
• Ransomware Attack – No backup → data unavailable
• DDoS Attack – Service unavailable → loss of trust
Summary
• Security is essential for data & systems
• CIA + principles form the foundation
• Security services define what is required
• Mechanisms provide the tools to achieve services

Web Security Services and Mechanism.pptx

  • 1.
    Security Fundamentals Need forSecurity | Principles | Services | Mechanisms
  • 2.
    Need for Security •Protect sensitive data (personal, financial, organizational) • Ensure integrity of information • Keep systems and services available • Prevent unauthorized access or misuse • Build trust among users • Meet compliance and legal requirements • Example: Online banking transactions
  • 3.
    Principles of Security(CIA +) • Confidentiality – Only authorized users can access data • Integrity – Data must remain accurate and unchanged • Availability – Resources must be accessible when needed • Authentication – Verify identity • Authorization – Grant appropriate access • Non-repudiation – Cannot deny an action/transaction • Accountability – Actions can be traced
  • 4.
    OSI Security Architecture •To assess effectively the security needs of an organization and to evaluate and choose various security products and policies, the manager responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local and wide area networks, the problems are compounded. • ITU-T Recommendation X.800, Security Architecture for OSI, defines such a systematic approach. The open systems interconnection (OSI) security architecture is useful to managers as a way of organizing the task of providing security. Furthermore, because this architecture was developed as an international standard, computer and communications vendors have developed security features for their products and services that relate to this structured definition of services and mechanisms. For our purposes, the OSI security architecture provides a useful, if abstract, overview of many of the concepts that this book deals with
  • 5.
  • 7.
  • 8.
    Security Services (ISO7498-2) • Authentication – Prove identity • Access Control – Restrict unauthorized users • Data Confidentiality – Prevent data leakage • Data Integrity – Detect changes in data • Non-Repudiation – Proof of origin & delivery • Availability Service – Reliable access to resources
  • 9.
  • 10.
    Security Mechanisms • Encryption– Protect confidentiality • Digital Signatures – Authentication, integrity, non-repudiation • Hash Functions – Verify data integrity • Authentication Protocols – Passwords, OTPs, biometrics • Access Control Lists (ACLs) – Define permissions • Firewalls / IDS / IPS – Block & detect attacks • Audit Logs – Track user actions • Backups & Redundancy – Maintain availability
  • 11.
    Example Diagram: SecurityConcepts Flow Services (Authentication, Confidentiality, Integrity, Availability) Mechanisms (Encryption, Hashing, Firewalls, Logs)
  • 12.
    Real-Life Case Studies •Data Breach – Weak authentication → confidential data leaked • Ransomware Attack – No backup → data unavailable • DDoS Attack – Service unavailable → loss of trust
  • 13.
    Summary • Security isessential for data & systems • CIA + principles form the foundation • Security services define what is required • Mechanisms provide the tools to achieve services