Chapter 1 PDF
Chapter 1 PDF
Assigned to:
Kinjal G. Khattar
Faculty of MCA
Bhagwan Mahavir College of Computer Applicati
on
Text Book: Network Security
Essentials
(Back Orifice)
Low
Conclusion:
• Over time, attacks have grown more sophis
ticated while skill and knowledge required t
o mount an attack has declined.
2. The OSI Security Architecture
• Requirement:
• To access effectively the security needs, choose &
evaluate security products & Policies, systematic
approach is needed.
• Solution? ITU-T2 Recommendation X.800, Security
Architecture for OSI.
• OSI Security Architecture focuses on
– Security Attacks
– Security Mechanisms
– Security Service
• Security Attack: Any action that compromises th
e security of information.
• Security Mechanism: A mechanism that is desig
ned to detect, prevent, or recover from a securit
y attack.
• Security Service: A service that enhances the sec
urity of data processing systems and information
transfers. A security service makes use of one or
more security mechanisms.
Confidentiality
Integrity Availability
4. Security Services
• X.800 defines a security service that is provided by protoc
ol layer of communicating open system.
• Security Service implement security policies and are imple
mented by security mechanism.
• X.800 divides services into 5 categories and fourteen speci
fic services. (Table 1.2)
– Data Confidentiality (privacy)
– Authentication (who created or sent the data)
– Data Integrity (has not been altered)
– Non-repudiation (the order is final)
– Access Control (prevent misuse of resources)
– Availability (permanence, non-erasure)
• Denial of Service Attacks
• Virus that deletes files
Availability Service:
– Both X.800 & RFC2828 defined availability property of
system.
– System is available if it provides services according to t
he system design whenever user request them.
– Attacks results in loss of or reduction in availability.
– Can be associated with services property.
– Address security concerns raised by denial-of-services
attacks.
– Depends upon:
• Management & Control of system resources
• Access control service.
5 Security Mechanisms
• Defined in X.800.
• Classification 1:
• 1. Reversible Encipherment Mechanism:
– Simply encryption algorithm.
– Allows data encryption & subsequent decryption.
• 2. Irreversible Encipherment Mechanism:
– Include hash algorithms.
– Include message authentication codes.
– Used in digital signature & message authentication app
lication.
• Classification 2:
• 1. Specific Security Mechanisms
– May be incorporated into the appropriate prot
ocol layer in order to provide some of the OSI s
ecurity services
• 2. Pervasive Security Mechanisms
– Mechanisms that are not specific to any partic
ular OSI security service or protocol layer
X.800 indicates relationship between security services and
security mechanisms given in the following table.
6. A Model for Network Security:
• The sender and receivers are Principals in transaction and
they should co-operate.
• Logical channel using TCP/IP is developed between princip
als and needs security.
• Two components of technique providing security are:
– Encryption of the message.
– Encryption Key.
• General model shows that there are four basic tasks in des
igning a particular security service:
• Which four? Lets see...
• 1. Design an algorithm for performing the secu
rity-related transformation. The algorithm sho
uld be such that an opponent cannot defeat its
purpose.
• 2. Generate the secret information to be used
with the algorithm.
• 3. Develop methods for the distribution and sh
aring of the secret information.
• 4. Specify a protocol to be used by the two prin
cipals that makes use of the security algorithm
and the secret information to achieve a particu
lar security service.
• Need? Protect information system from unwante
d access like...
• Human Attack:
– Hacker: Someone who with no malign intent, simply ge
ts satisfaction from breaking and entering a computer
system.
– Intruder: seeks to exploit computer assets for financial
gain.
• Software Attack:
– Virus & Worms: attacks can be introduced into a syste
m by means of a disk that contains the unwanted logic
concealed in otherwise useful software.
• Solution? Defensive Methods
Methods of Defense
• Gate-Keeper function: It includes password-based login pr
ocedures that are designed to deny access to all but autho
rized users and screening logic that is designed to detect a
nd reject worms, viruses, and other similar attacks. See ne
xt figure.
• System activity monitoring.
• Encryption
• Software Controls (access limitations in a data base, in op
erating system protect each user from other users)
• Hardware Controls (smartcard)
• Policies (frequent changes of passwords)
• Physical Controls
7. Internet Standards and the Inter
net Society
• Protocols included in TCP/IP protocol suite are standardiz
ed.
• Who standardize the developed technology and publish?
• The Internet society.
• Is composed of
– Internet Architecture Board (IAB): Responsible far defining the ov
erall architecture of the Internet, providing guidance and broad di
rection to the IETF.
– Internet Engineering Task Force (IETF): The protocol engineering a
nd development arm of the Internet.
– Internet Engineering Steering Group (IESG): Responsible far techni
cal management of IETF activities and the Internet standards proc
ess
• IETF procedure:
– Working group will make a draft version of the document av
ailable as an Internet Draft, which is placed in the IETF's "Int
ernet Drafts" online directory.
– The document may remain as an Internet Draft for up to six
months, and interested parties may review and comment o
n the draft.
– The working-group may subsequently publish a revised versi
on of the draft as RFC (Request for Comment) which are the
working notes of the Internet research and development co
mmunity.
– The IETF is responsible for publishing the RFCs, with approva
I of the IESG.
– Table 1.6 shows the IETF areas and their focus.
The Standardization Process:
• The decision of which RFCs become Internet standard
s is made by the IESG, on the recommendation of the
IETF.
• To become a standard, a specification must meet the
following criteria:
1. Be stable and well understood
2. Be technically competent
3. Have multiple, independent, and interoperable implement
ations with substantial operational experience.
4. Enjoy significant public support .
5. Be recognizably useful in some or all parts of the Internet
• The left-hand side of Figure shows the series of steps, called th
e standards track, that a specification goes through to become
a standard; this process is defined in RFC 2026.
• IETF must make a recommendation for advancement of the pr
otocol, and the IESG must ratify it.
• The white boxes in Figure 1.5 represent temporary states, used
for small duration like 6 months.
• The gray boxes represent long-term states that may be occupie
d for years.
• After significant implementation and operational experience h
as been obtained,
• a specification may be elevated to Internet Standard. At this po
int, the specification is assigned an STD number as well as an R
FC number.
• Finally, when a protocol becomes obsolete, it is assigned to the
Historic state.
Internet Standards Categories
• All Internet standards fall into one of two categories:
• Assignment Submission?????