ISS Principles of Security
ISS Principles of Security
Non-repudiation Assuring that one cannot deny of sending the transmitted data
Example: When the user A wants to share a secrete message with user B (suppose a confidential
mail) and if another user C gets access to this message, which is not desired, then this is breach of
confidentiality. This type of attack is called as interception.
Sender Receiver
User C
Intruder
For instance, if user C transfers money from user A’s account to user B’s account and acting or posing
as user A then this type of attack is called as fabrication.
User A claims
the denial of
User A User B
data sent to
User B Receiver
Sender
For instance, suppose user A request bank to transfer funds to user B over the Internet. After the bank
performs the funds transfer, user A could claim that he has never sent funds transfer instruction to the
bank. Thus, user A repudiates, or denies, his funds transfer instruction. The principle of non-
repudiation eliminates the possibility of refuting something after it has been done.
Non-repudiation does not allow the sender of the message to refute the claim of
Note not sending the message.
Access Control
The principle of access control determines who should be given rights to access the system. Access
control is broadly related to two areas:
• Role Management - It focuses on user side as which user can do what.
• Rule management - It focuses on resource side as which resource is accessible under what
conditions
For instance, user A may be given the access permission to user A is to only view the database
whereas user B is permitted to update the data base. In Linux based systems permissions are
given in the form of rwx-rwx-rwx (user, group and others).
Note Access control specifies and controls who can access what
Availability
According to the principle of availability, resources or information must be available to authorized
parties at all the times.
User A User B
Sender Receiver
Data interrupted by User C
User C
Intruder
For example, due to the intentional actions of unauthorized user C, an authorized user A may not be
able to contact user B. This type of attack is called as interruption.
Network
Security
Availability Integrity
References:
1. Cryptography and Network Security by Behrouz A Forouzan and Debdeep
Mukhopadhayay
2. Cryptography and Network Security by Atul Kahate
3. Cryptography and Network Security by William Stallings