Osi Security Architecture Tcs 619

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

OSI SECURITY ARCHITECTURE

TCS 619: Unit 1: Lecture 2


Security Architecture for OSI
• ITU-T Recommendation X.800, Security
Architecture for OSI defines systematic way to
– Define the requirements for security
– Characterizing the approaches to satisfying those
requirements

ITU-T- international Telecommunication Union


OSI- Open Systems Interconnections
OSI Security Architecture

SECURITY
ARCHITECTURE

SECURITY SECURITY SECURITY


ATTACK MECHANISM SERVICE
OSI Security Architecture
The following concepts are used:
• Security attack : Any actions that compromises the
security of information owned by an organization (or a
person)
• Security mechanism: a mechanism that is designed to
detect, prevent, or recover from a security attack
• Security service: a service that enhances the security
of the data processing systems and the information
transfers of an organization. The services make use of
one or more security mechanisms to provide the
service
ATTACK
GAINING THE ACCESS OF DATA BY UNAUTHORISED USER

GAINING MEANS :
1. ACCESSING DATA
2. MODIFYING DATA
3. DESTROYING DATA

TWO TYPES OF ATTACK :


1. PASSIVE
2. ACTIVE ATTACK

PASSIVE ATTACK : NO MODIFICATION IS DONE BY THE UNAUTHORISED


PERSON

ACTIVE : MODIFICATION IS DONE BY THE UNAUTHORISED PERSON


ATTACKS

The three goals of securityconfidentiality, integrity,


and availabilitycan be threatened by security attacks.

1 Attacks Threatening Confidentiality


2 Attacks Threatening Integrity
3 Attacks Threatening Availability

1.6
Taxonomy of attacks with relation to security goals
Attacks Threatening Confidentiality

Snooping refers to unauthorized access to or interception of


data.

Traffic analysis refers to obtaining some other type of


information by monitoring online traffic.
Attacks Threatening Integrity

1. Modification means that the attacker intercepts the


message and changes it.

2. Masquerading or spoofing happens when the attacker


impersonates somebody else.

3. Replaying means the attacker obtains a copy


of a message sent by a user and later tries to replay it.

4. Repudiation means that sender of the message might


later deny that she has sent the message; the receiver of the
message might later deny that he has received the message.
REPLAY ATTACK
• A REPLAY ATTACK OCCURS WHEN AN UNAUTHORIZED USER
CAPTURES NETWORK TRAFFIC AND THEN SEND THE
COMMUNICATION TO ITS ORIGINAL DESTINATION
• TO PREVENT : USE TIMESTAMPS & SEQUENCE NUMBERS
• IF THE TIMESTAMP IS BEYOND A CERTAIN TIME THEN THE
PACKET IS DISCARDED.
Attacks Threatening Availability

Denial of service (DoS) is a very common attack. It may


slow down or totally interrupt the service of a system.

1.11
Denial of Service Attacks
In a denial of service attack, a hacker compromises a
system and uses that system to attack the target
computer, flooding it with more requests for services
than the target can handle. In a distributed denial of
service attack, hundreds of computers (known as a
zombies) are compromised, loaded with DOS attack
software and then remotely activated by the hacker.
Passive Versus Active Attacks

ATTACKS TYPE THREAT


SNOOPING PASSIVE CONFIDENTIALITY
TRAFFIC ANALYSIS

MODIFICATION ACTIVE INTEGRITY


MASQUERADING
REPLAYING
REPUDIATION

DENIAL OF SERVICE ACTIVE AVAILABILITY


SERVICES AND MECHANISMS

ITU-T provides some Security Services and some


Mechanisms to implement those services.
Security services and mechanisms are closely related
because a mechanism or combination of mechanisms
are used to provide a service.

Main Topics :

1 Security Services (5 Types)


2 Security Mechanism ( 8 Types)
3 Relation between Services and Mechanisms
Security Services(5 Types)
Security Mechanism(8 Types)

1.16
Relation between Services and Mechanisms
1 Service = Many Mechanisms

1.17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy