3-Module2 Information and Network Security-05-08-2022
3-Module2 Information and Network Security-05-08-2022
Availability: Ensuring timely and reliable access to the information and use of
information.
A loss of availability is the disruption of access to the information system or
use of information system.
Assures that systems work promptly and service is not denied to authorized
users.
Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator.
This means verifying that users are trusted one and that each input arriving at
the system came from a trusted source.
Accountability: The security goal that generates the requirement for actions
of an entity to be traced uniquely to that entity.
Because truly secure systems are not yet an achievable goal, we must be able
to trace a security breach to a responsible party.
Systems must keep records of their activities to permit later forensic analysis
to trace security breaches or to aid in transaction disputes.
Security Attacks
Security attacks are broadly classified into passive attacks and active attacks
A passive attack attempts to learn or make use of information from the system
but does not affect system resources.
An active attack attempts to alter system resources or affect their operation.
Passive Attacks
Passive attacks are in the nature of eavesdropping. The goal of the opponent
is to obtain information that is being transmitted.
Two types of passive attacks are
(i) Release of message contents: A telephone conversation, an email message
and a transferred file may contain sensitive or confidential information. We
would like to prevent an opponent from learning the contents of these trans-
missions.
(ii) Traffic analysis: Masking the contents of messages or other information,
so that even if the opponent captured the message, he could not extract the
information from the message. The common technique for masking contents
is encryption.
Passive attacks are very difficult to detect, because they do not involve any
alteration of data.
Active Attacks
Active attacks involve some modification of the data stream or creation of a
false stream.
It can be subdivided into four categories
(i) masquerade
(ii) replay
(iii) modifications of messages
(iv) denial of service
Active Attacks
Active Attacks
Replay involves the passive capture of data unit and its subsequent retrans-
mission to produce an unauthorized effect(path1,2 and 3 active)
Modification of messages simply means that some portion of a legitimate mes-
sage is altered or delayed or reordered, to produce an unauthorized effect.(path1
and 2 active)
Security Mechanisms
Security Mechanisms
The security mechanisms are divided into those that are implemented in a
specific protocol layer, such as TCP or an application layer protocol, and those
that are not specific to any particular protocol layer or security service.
(i) Specific Security Mechanisms
(ii) Pervasive Security Mechanisms