Chapter One
Chapter One
2
• Integrity: This term covers two related concepts:
– Data integrity: Assures that information and programs are changed only in a specified
and authorized manner.
– System integrity: Assures that a system performs its intended function in an
unimpaired(modifies) manner, free from deliberate or inadvertent unauthorized
manipulation of the system.
• Availability: Assures that systems work promptly and service is not denied
to authorized users.
3
Additional security concepts:
• Authenticity:
• The property of being genuine and being able to be verified and trusted;
confidence in the validity of a transmission, a message, or message
originator.
• This means verifying that users are who they are and that each input
arriving at the system came from a trusted source.
• Accountability:
• The security goal that generates the requirement for actions of an entity to be
traced uniquely to that entity.
• This supports non repudiation, deterrence, fault isolation, intrusion detection and
prevention, and after-action recovery and legal action.
• Because truly secure systems are not yet an achievable goal, we must be able to
trace a security breach to a responsible party.
• Systems must keep records of their activities to permit later forensic analysis to
trace security breaches or to aid in transaction disputes.
4
Over View of Network Layer
• The topics that we will be discussing would be based on the diagram
below.
Application data
Presentation Application data
Session data
Transport Transport segments
Network Internet packets
Data Link frames
Network Access
Physical bits
The Upper Layers
OSI TCP / IP
Application (Layer7)
Session (Layer 5)
◼Session
◼Presentation
◼Application
The Session Layer
The Application Layer is the top layer of the reference model. It provides a
set of interfaces for applications to obtain access to networked services as
well as access to the kinds of network services that support applications
directly.
• OSI - FTAM,VT,MHS,DS,CMIP
TCP/IP - FTP,SMTP,TELNET,DNS,SNMP
OSI TCP / IP
Transport (Layer 4) Transport (TCP/UDP)
• Also provide a signaling service for the remote node so that the sending node
is notified when its data is received successfully by the receiving node
OSI Transport Layer
• Transport Layer protocols include the capability to acknowledge the
receipt of a packet; if no acknowledgement is received, the Transport
Layer protocol can retransmit the packet or time-out the connection
and signal an error
OSI Transport Layer
• Transport protocols can also mark packets with sequencing
information so that the destination system can properly order the
packets if they’re received out-of-sequence
• In addition, Transport protocols provide facilities for insuring the
integrity of packets and requesting retransmission should the packet
become garbled when routed.
OSI Transport Layer
• Transport protocols provide the capability for multiple application processes
to access the network by using individual local addresses to determine the
destination process for each data stream.
TCP/IP Transport Layer
• Defines two standard transport protocols: TCP and UDP
• TCP implements a reliable data-stream protocol
• connection oriented.
• UDP implements an unreliable data-stream
• connectionless
• Protocol: An agreement between parties on how communication should take
place.
• Protocols define format, order of messages sent and received among network
entities, and actions taken on message transmission, receipt
• All communication activity in the Internet are governed by protocols.
TCP/IP Transport Layer
• TCP provides reliable data transmission
• UDP is useful in many applications
• E.g. Where data needs to be broadcasted or multicast
• Primary difference is that UDP does not necessarily provide
reliable data transmission
TCP/IP Transport Layer
OSI TCP / IP
• The Data Link Layer describes the logical organization of data bits transmitted
on a particular medium.
• Ex: this layer defines the framing, addressing and check summing of Ethernet packets.