Osi Security Architecture TCS 619
Osi Security Architecture TCS 619
Osi Security Architecture TCS 619
SECURITY
ARCHITECTURE
GAINING MEANS :
1. ACCESSING DATA
2. MODIFYING DATA
3. DESTROYING DATA
1.7
Taxonomy of attacks with relation to security goals
Attacks Threatening Confidentiality
1.13
Denial of Service Attacks
In a denial of service attack, a hacker compromises a
system and uses that system to attack the target
computer, flooding it with more requests for services
than the target can handle. In a distributed denial of
service attack, hundreds of computers (known as a
zombies) are compromised, loaded with DOS attack
software and then remotely activated by the hacker.
Passive Versus Active Attacks
Main Topics :
1.19
Security Mechanism
The mechanism that is built to identify any breach
of security or attack on the organization, is called a
security mechanism.
Security Mechanisms are also responsible for
protecting a system, network, or device against
unauthorized access, tampering, or other security
threats.
Security mechanisms can be implemented at
various levels within a system or network and can
be used to provide different types of security, such
as confidentiality, integrity, or availability.
Security Mechanism
• Encipherment (Encryption) involves the use of
algorithms to transform data into a form that can only
be read by someone with the appropriate decryption
key. Encryption can be used to protect data it is
transmitted over a network, or to protect data when it
is stored on a device.
• Digital signature is a security mechanism that involves
the use of cryptographic techniques to create a unique,
verifiable identifier for a digital document or message,
which can be used to ensure the authenticity and
integrity of the document or message.
Security Mechanism
• Traffic padding is a technique used to add
extra data to a network traffic stream in an
attempt to obscure the true content of the
traffic and make it more difficult to analyze.
• Routing control allows the selection of
specific physically secure routes for specific
data transmission and enables routing
changes, particularly when a gap in security is
suspected.
Security Mechanism
1. Encipherment:
This is hiding or covering of data which provides
confidentiality. It is also used to complement other
mechanisms to provide other services. Cryptography and
Steganography are used for enciphering
2. Digital Integrity:
The data integrity mechanism appends to the data a
short check value that has been created by a specific
process from the data itself. Data integrity is preserved by
comparing check value received to the check value
generated.
Security Mechanism
3. Digital Signature:
A digital signature is a means by which the sender can
electronically sign the data and the receiver can
electronically verify the signature. Public and private keys
can be used.
4. Authentication Exchange:
In this two entities exchange some messages to prove
their identity to each other.
5. Traffic Padding:
Traffic padding means inserting some bogus data into the
data traffic to thwart the adversary’s attempt to use the
traffic analysis.
Security Mechanism
6. Routing Control:
Routing control means selecting and continuously changing
different available routes between sender and receiver to
prevent the opponent from eavesdropping on a particular
route.
7. Notarization:
Notarization means selecting a third trusted party to
control the communication between two entities. The
receiver can involve a trusted third party to store the
sender request in order to prevent the sender from later
denying that she has made a request.
8. Access Control:
Access control used methods to prove that a user has
access right to the data or resources owned by a system.
Examples of proofs are passwords and PINs.
Relation between Services and Mechanisms
1 Service = Many Mechanisms
1.26