0% found this document useful (0 votes)
20 views22 pages

Is 04 Security Mechanism

Uploaded by

maryamtoheed4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views22 pages

Is 04 Security Mechanism

Uploaded by

maryamtoheed4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

#horserevenge #animalinstincts #wildnature #horsepower #animalbehavior #naturemoments #horseactions #equinespirit #animalworld #horselife

#unexpectedmoments #animalinstinct #natureatwork #wildhorse #horselovers #naturewonders #animalreaction #horseinstinct #naturelife #equinebehavior
#wildlifeaction #horsepowers #animalmoments #wildnaturelife #equineworld #revengeinstinct #horsereactions #animalstories #wildlifemoments #horseplay

Information Security
Arfan Shahzad
{ [email protected] }
Security Mechanism

• Security mechanism can be termed as a set of processes that provide


security or deal with recovery from security attack.

• A process (or a device incorporating such a process) that is designed


to detect, prevent, or recover from a security attack.

• The mechanisms are divided to be implemented in a specific protocol


layer, such as TCP for an application-layer protocol.
Security Mechanism cont…
Security Mechanism cont…
Encipherment
• Encipherment (encryption) deals with hiding and covering of data
which helps data to become confidential.

• It is achieved by applying mathematical calculations or algorithms


(encryption) which reconstruct information into unreadable form.

• The subsequent recovery of the data depend on an algorithm and


zero or more encryption keys.
Security Mechanism cont…
Encipherment
• Decipherment (decryption) is the reverse operation by which the
ciphered text is transformed to the plaintext.

• It is achieved by two famous techniques named Cryptography and


Encipherment.

• Level of data encryption is dependent on the algorithm used for


encipherment.
Security Mechanism cont…
Encipherment
Security Mechanism cont…
Access Control
• Access control used methods to prove that a user has access right to
the data or resources owned by a system.

• It can be achieved by various techniques such as applying passwords,


using firewall, or just by adding PIN to data.
Security Mechanism cont…
Access Control
Security Mechanism cont…
Access Control
Security Mechanism cont…
Notarization
• This security mechanism involves use of trusted third party (TTP) in
communication.

• It acts as mediator between sender and receiver so that any chance


of conflict is reduced.

• This mediator keeps record of requests made by sender to receiver


for later denied.
Security Mechanism cont…
Notarization
• Notarization mechanisms can be used to assure certain properties of
the data communicated between two or more entities, such as its
integrity, origin, time, or destination.
Security Mechanism cont…
Data Integrity
• This security mechanism is achieved by appending value to data to
which is created by data itself.

• It is similar to sending packet of information known to both sending


and receiving parties and checked before and after data is received.

• When this packet or data which is appended is checked and is the


same while sending and receiving data integrity is maintained.
Security Mechanism cont…
Data Integrity
Security Mechanism cont…
Authentication Exchange
• This security mechanism deals with identity to be known in
communication.

• This is achieved at the TCP/IP layer where two-way handshaking


mechanism is used to ensure data is sent or not
Security Mechanism cont…
Bit Stuffing
• This security mechanism is used to add some extra bits into data
which is being transmitted.

• It helps data to be checked at the receiving end and is achieved by


Even parity or Odd Parity.
Security Mechanism cont…
Bit Stuffing
Security Mechanism cont…
Digital Signature
• This security mechanism is achieved by adding digital data that is not
visible to eyes.

• It is form of electronic signature which is added by sender which is


checked by receiver electronically.

• This mechanism is used to preserve data which is not more


confidential but sender’s identity is to be notified.
Security Mechanism cont…
Digital Signature
Security Mechanism cont…
Traffic Padding
• Traffic padding means inserting some bogus data into the data traffic to
frustrate the adversary’s attempt to use the traffic analysis.

• Traffic padding refers to the generation of spurious instances of


communication, spurious data units, and spurious data within data units.

• The aim is not to reveal if data that are being transmitted actually
represent and encode information.
Security Mechanism cont…
Traffic Padding
Security Mechanism cont…
Routing control
• Routing control means selecting and continuously changing different
available routes between sender and receiver to prevent the
opponent from eavesdropping on a particular route.
Security Mechanism cont…
Routing control

You might also like