Lecture 03
Lecture 03
Lecture 3
Delivered By: Dr.Ahthasham Sajid
Dated: 9th September 2024
Agenda
• Types of Security
• Security Goals
• Security Terminologies
• Security Attack, Services and Mechanisms
• Security Attacks
• Active vs. Passive Attacks
• OSI Security Architecture X.800
• Model of Network Access Security
• Methods of Defense
• Risk
Types of Security
Security Goals
Confidentiali
ty
Integrity
Availabilit
y
4
Terminologies
Security Service
• Is something that enhances the security of the data processing
systems and the information transfers of an organization
• Intended to counter security attacks
• Make use of one or more security mechanisms to provide the
service
• Replicate functions normally associated with physical documents
e.g.
• have signatures or dates
• need protection from disclosure, tampering, or destruction
8
Security Mechanism
9
Security Attack
12
Classify Security Attacks as
• Passive attacks - eavesdropping on, or monitoring of, transmissions
to:
• obtain message contents, or
• monitor traffic flows
• Active attacks – modification of data stream to:
• masquerade of one entity as some other
• replay previous messages
• modify messages in transit
• denial of service
13
Passive Attacks: Release of Message
Contents
14
Passive Attacks: Traffic Analysis
15
Active Attacks: Masquerade
16
Active Attacks: Replay
17
Active Attacks: Modification of
Messages
18
Active Attacks: Denial of Service
19
20
OSI Security Architecture
21
Security Services
22
Security Services (X.800)
• X.800 defines security services in 5 major categories
• Authentication - assurance that the communicating entity is
the one claimed
• Access Control - prevention of the unauthorized use of a
resource
• Data Confidentiality –protection of data from unauthorized
disclosure
• Data Integrity - assurance that data received is as sent by an
authorized entity
• Non-Repudiation - protection against denial by one of the
parties in a communication
23
Security Services
• Confidentiality (privacy)
• Data integrity
• Authentication exchange
26
Model for Network Security
27
Model for Network Access Security
28
Model for Network Access Security
29
Methods of Defense
• Encryption
• Software Controls (access limitations in a data base, in operating
system protect each user from other users)
• Hardware Controls (smartcard)
• Policies (frequent changes of passwords)
• Physical Controls
30