Osi Security Architecture
Osi Security Architecture
Osi Security Architecture
MECHANISMS
INTRODUCTION
Computer data often travels from one computer to another, leaving the safety of
its protected physical surroundings. Once the data is out of hand, people with bad
intention could modify or forge your data, either for amusement or for their own benefit.
Cryptography can reformat and transform our data, making it safer on its trip
between computers. The technology is based on the essentials of secret codes, augmented
by modern mathematics that protects our data in powerful ways.
To assess effectively the security needs of an organization and to evaluate and choose
various security products and policies, the manager responsible for security needs some
systematic way of defining the requirements for security and characterizing the
approaches to satisfying those requirements. The OSI security architecture was developed
in the context of the OSI protocol architecture, which is described in Appendix H.
However, for our purposes in this chapter, an understanding of the OSI protocol
architecture is not required.
For our purposes, the OSI security architecture provides a useful, if abstract, overview of
many of the concepts.. The OSI security architecture focuses on security attacks,
mechanisms, and services. These can be defined briefly as follows:
Threat
Attack
An assault on system security that derives from an intelligent threat; that is, an intelligent
act that is a deliberate attempt (especially in the sense of a method or technique) to evade
security services and violate the security policy of a system.
SECURITY SERVICES
The classification of security services are as follows:
Non repudiation: Requires that neither the sender nor the receiver of a message
be able to deny the transmission.
AUTHENTICATION
The assurance that the communicating entity is the one that it claims to be.
ACCESS CONTROL
The prevention of unauthorized use of a resource (i.e., this service controls who can have
access to a resource, under what conditions access can occur, and what those accessing
the resource are allowed to do).
DATA CONFIDENTIALITY
Connection Confidentiality
Connectionless Confidentiality
Selective-Field Confidentiality
AUTHENTICATION
The confidentiality of selected fields within the user data on a connection or in a single
data block.
The protection of the information that might be derived from observation of traffic flows.
Provides for the integrity of all user data on a connection and detects any modification,
insertion, deletion, or replay of any data within an entire data sequence, with recovery
attempted.
Provides for the integrity of selected fields within the user data of a data block
transferred over a connection and takes the form of determination of whether the selected
fields have been modified, inserted, deleted, or replayed.
Connectionless Integrity
Provides for the integrity of a single connectionless data block and may take the form of
detection of data modification. Additionally, a limited form of replay detection may be
provided.
Provides for the integrity of selected fields within a single connectionless data block;
takes the form of determination of whether the selected fields have been modified.
NONREPUDIATION
Nonrepudiation, Origin
Nonrepudiation, Destination
SECURITY MECHANISMS
One of the most specific security mechanisms in use is cryptographic techniques.
Encryption or encryption-like transformations of information are the most common
means of providing security. Some of the mechanisms are
Encipherment
Digital Signature
Access Control
SECURITY ATTACKS
There are four general categories of attack which are listed below.
Interruption
An asset of the system is destroyed or becomes unavailable or unusable. This is
an attack on availability.
e.g., destruction of piece of hardware, cutting of a communication line or
disabling of file management system.
Interception
Modification
An unauthorized party not only gains access to but tampers with an asset. This is
an attack on integrity.
e.g., changing values in data file, altering a program, modifying the contents of
messages being transmitted in a network.
Fabrication
An unauthorized party inserts counterfeit objects into the system. This is an attack
on authenticity.
e.g., insertion of spurious message in a network or addition of records to a file.
Passive attack
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
The goal of the opponent is to obtain information that is being transmitted. Passive
attacks are of two types:
Active attacks
These attacks involve some modification of the data stream or the creation of a false
stream. These attacks can be classified in to four categories:
By,
N. Harismita
16MSS017