Notes 3
Notes 3
Introduction
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 1
Objectives
❑ To define three security goals
❑ To define security attacks that threaten security
goals
❑ To define security services and how they are
related to the three security goals
❑ To define security mechanisms to provide security
services
❑ To introduce two techniques, cryptography and
steganography, to implement security mechanisms.
2
1-1 SECURITY
GOALS
This section defines three security goals.
3
1.1 Continued
Figure 1.1 Taxonomy of security goals
4
1.1.1 Confidentiality
5
1.1.2 Integrity
6
1.1.3 Availability
7
1-2
ATTACKS
The three goals of security⎯confidentiality, integrity,
and availability⎯can be threatened by security
attacks.
9
1.2.1 Attacks Threatening Confidentiality
10
1.2.2 Attacks Threatening Integrity
11
1.2.3 Attacks Threatening Availability
12
1.2.4 Passive Versus Active Attacks
13
1-3 SERVICES AND
MECHANISMS
ITU-T provides some security services and some
mechanisms to implement those services. Security
services and mechanisms are closely related because a
mechanism or combination of mechanisms are used to
provide a service..
14
1.3.1 Security Services
Figure 1.3 Security services
15
1.3.2 Security Mechanism
Figure 1.4 Security mechanisms
16
1.3.3 Relation between Services and Mechanisms
17
1-4
TECHNIQUES
18
1.4.1 Cryptography
19
1.4.2 Steganography
20
1.4.2 Continued
21
1-5 THE REST OF THE
BOOK
The rest of this book is divided into four parts.
Part One: Symmetric-Key Enciphermen
Part Two: Asymmetric-Key Encipherment
Part Three: Integrity, Authentication, and Key Management
Part Four: Network Security
22