Chapter 1 Introduction
Chapter 1 Introduction
DSE 2224
Dr. Savitha G
Dr. Girisha S
Mr. Ashutosh H B
Data Privacy
• Data privacy generally means the ability of a person to determine
for themselves when, how, and to what extent personal
information about them is shared with or communicated to
others.
➢Firewalls
➢Network limitations
➢Security software
➢User authentication
➢Internal security measures
Security vs. privacy
• The main difference between privacy and security is that privacy
involves how your data is used and controlled, while security protects
this data.
• Security can exist without privacy, but the reverse is not true.
• Computer security and privacy are both equally important for managing
personal and sensitive information and data.
Security metrics: Design, Data sources, Analysis of security metrics data, Measuring
security cost and value, Different context for security process management.
• Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator.
• This means verifying that users are who they say they are and that each input
arriving at the system came from a trusted source.
• Accountability: The security goal that generates the requirement for actions of
an entity to be traced uniquely to that entity.
• This supports nonrepudiation, deterrence, fault isolation, intrusion detection
and prevention, and after action recovery and legal action
The OSI Security Architecture
• Necessity of Open Systems Interconnection(OSI)
• The manager responsible for security needs some systematic way of defining
the requirements for security and characterizing the approaches to satisfying
above requirements
• The OSI security architecture is useful to managers as a way of organizing
the task of providing security
• The OSI security architecture focuses on security attacks, mechanisms, and
services.
The OSI Security Architecture
The OSI Security Architecture
• Security attack: Any action that compromises the security of
information owned by an organization.
➢We would like to prevent an opponent from learning the contents of these
transmissions.
Security Attacks: Passive attacks
• Traffic analysis:
➢Involves the passive capture of a data unit and its subsequent retransmission
to produce an unauthorized effect.
Security Attacks: Active attacks
• Modification:
➢ For example, a message meaning “Allow John Smith to read confidential file accounts” is
modified to mean “Allow Fred Brown to read confidential file accounts.”
Security Attacks: Active attacks
• The denial of service:
➢This attack may have a specific target; for example, an entity may suppress all
performance.
Security Attacks: Active attacks
• It is quite difficult to prevent active attacks absolutely because of
the wide variety of potential physical, software, and network
vulnerabilities.
• Instead, the goal is to detect active attacks and to recover from any
disruption or delays caused by them.
Security Services
• It is a service that is provided by a protocol layer of communicating open systems and
that ensures adequate security of the systems or of data transfers
1. Authentication
2. Access Control
3. Data Confidentiality
4. Data Integrity
5. Nonrepudiation
6. Availability of service
Security Services
1. Authentication:
➢The authentication service is concerned with assuring that a communication
is authentic.
➢The function of the authentication service is to assure the recipient that the
message is from the source that it claims to be from.
➢It does not provide protection against the duplication or modification of data units
2. Access control:
➢Access control is the ability to limit and control the access to host systems and
applications via communications links.
➢To achieve this, each entity trying to gain access must first be identified, or
authenticated, so that access rights can be tailored to the individual
Security Services
3. Confidentiality:
➢Broadest service protects all user data transmitted between two users
over a period of time
➢Thus, when a message is sent, the receiver can prove that the alleged sender
in fact sent the message. Similarly, when a message is received, the sender
can prove that the alleged receiver in fact received the message.
6. Availability of Service:
➢Availability to be the property of a system or a system resource being
accessible and usable upon demand by an authorized system entity, according
to performance specifications for the system.
Security Mechanism
• The mechanisms are divided into those that are implemented in a specific protocol layer,
such as TCP or an application-layer protocol, and those that are not specific to any
particular protocol layer or security service.
• Encipherment: The use of mathematical algorithms to transform data into a form that is
not readily intelligible.
• Digital Signature: Data appended to, or a cryptographic transformation of, a data unit
that allows a recipient of the data unit to prove the source and integrity of the data unit
and protect against forgery.
Security Mechanism
• Access Control: A variety of mechanisms that enforce access rights to resources
• Data Integrity: A variety of mechanisms used to assure the integrity of a data unit or
stream of data units.
• Traffic Padding: The insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts.
• Routing Control: Enables selection of particular physically secure routes for certain
data and allows routing changes, especially when a breach of security is suspected.
• Notarization: The use of a trusted third party to assure certain properties of a data
exchange.
Security Mechanism
• Trusted Functionality: That which is perceived to be correct with respect to some
criteria
• Security Audit Trail: Data collected and potentially used to facilitate a security audit
• Security Recovery: Deals with requests from mechanisms, such as event handling and
management functions, and takes recovery actions.
A Model for Network Security
A Model for Network Security
• using this model requires us to:
information or resources
➢Monitoring of authorized users for misuse audit logging for forensic uses, etc.
END