Need for Security
•Protect sensitive data (personal, financial, organizational)
• Ensure integrity of information
• Keep systems and services available
• Prevent unauthorized access or misuse
• Build trust among users
• Meet compliance and legal requirements
• Example: Online banking transactions
3.
Principles of Security(CIA +)
• Confidentiality – Only authorized users can access data
• Integrity – Data must remain accurate and unchanged
• Availability – Resources must be accessible when needed
• Authentication – Verify identity
• Authorization – Grant appropriate access
• Non-repudiation – Cannot deny an action/transaction
• Accountability – Actions can be traced
4.
OSI Security Architecture
•To assess effectively the security needs of an organization and to evaluate and
choose various security products and policies, the manager responsible for security
needs some systematic way of defining the requirements for security and
characterizing the approaches to satisfying those requirements. This is difficult
enough in a centralized data processing environment; with the use of local and
wide area networks, the problems are compounded.
• ITU-T Recommendation X.800, Security Architecture for OSI, defines such a
systematic approach. The open systems interconnection (OSI) security architecture
is useful to managers as a way of organizing the task of providing security.
Furthermore, because this architecture was developed as an international standard,
computer and communications vendors have developed security features for their
products and services that relate to this structured definition of services and
mechanisms. For our purposes, the OSI security architecture provides a useful, if
abstract, overview of many of the concepts that this book deals with
Real-Life Case Studies
•Data Breach – Weak authentication → confidential data leaked
• Ransomware Attack – No backup → data unavailable
• DDoS Attack – Service unavailable → loss of trust
13.
Summary
• Security isessential for data & systems
• CIA + principles form the foundation
• Security services define what is required
• Mechanisms provide the tools to achieve services