Lecture-2-1
Lecture-2-1
Lecture # 2
1
Objectives
• Introduction to Cyber Security
2
OSI Security Architecture
• The OSI (Open Systems Interconnection) Security
Architecture defines a systematic approach to
providing security at each layer.
• Security Attack
• Security mechanism
• Security Service
Dr Shafiq 4
OSI Security Architecture
Dr Shafiq 5
OSI Security Architecture
1. Security Attacks:
• A security attack is an attempt by a person or entity to
gain unauthorized access to disrupt or compromise
the security of a system, network, or device.
Dr Shafiq 6
OSI Security Architecture
A. Passive Attack:
• Attacks in which a third-party intruder tries to access
the message/ content/ data being shared by the sender
and receiver by keeping a close watch on the
transmission is called Passive Attacks.
Dr Shafiq 7
OSI Security Architecture
• Passive attacks are typically focused on gathering
information or intelligence, rather than causing
damage or disruption.
Dr Shafiq 9
OSI Security Architecture
Passive attacks are further divided into two parts based on
their behavior:
1. Eavesdropping:
– This involves the attacker intercepting and listening to
communications between two or more parties without
their knowledge or consent.
Dr Shafiq 12
OSI Security Architecture
• The message/ data transmitted doesn’t remain in its
usual form and shows deviation from its usual
behavior.
Dr Shafiq 13
OSI Security Architecture
Masquerade:
• Masqurade is a type of active attack in which the
attacker pretends to be an authentic sender in order to
gain unauthorized access to a system.
Dr Shafiq 14
OSI Security Architecture
Replay:
• Replay is a type of active attack in which the attacker
intercepts a transmitted message through a passive
channel and then maliciously or fraudulently replays
or delays it at a later time.
Dr Shafiq 15
OSI Security Architecture
Modification of Message :
• Modification of Message involves the attacker
modifying the transmitted message and making the
final message received by the receiver look like it’s
not safe or non-meaningful.
Dr Shafiq 16
OSI Security Architecture
Denial of service (DoS) :
• Denial of service (DoS) attacks involve the attacker
sending a large volume of traffic to a system,
network, or device in an attempt to overwhelm it and
make it unavailable to legitimate users.
Dr Shafiq 17
OSI Security Architecture
2. Security Mechanism
• The mechanism that is built to identify any breach of
security or attack on the organization, is called a
security mechanism.
Dr Shafiq 18
OSI Security Architecture
• Security mechanisms can be implemented at various
levels within a system or network and can be used to
provide different types of security, such as
confidentiality, integrity, or availability.
Dr Shafiq 19
OSI Security Architecture
Encipherment (Encryption)
• Encipherment (Encryption) involves the use of
algorithms to transform data into a form that can only
be read by someone with the appropriate decryption
key.
Dr Shafiq 20
OSI Security Architecture
Digital signature
• Digital signature is a security mechanism that
involves the use of cryptographic techniques to create
a unique, verifiable identifier for a digital document
or message, which can be used to ensure the
authenticity and integrity of the document or
message.
Dr Shafiq 21
OSI Security Architecture
Traffic padding
• Traffic padding is a technique used to add extra data
to a network traffic stream in an attempt to obscure
the true content of the traffic and make it more
difficult to analyze.
Dr Shafiq 22
OSI Security Architecture
Routing control
• Routing control allows the selection of specific
physically secure routes for specific data transmission
and enables routing changes, particularly when a gap
in security is suspected.
Dr Shafiq 23
OSI Security Architecture
3. Security Services:
• Security services refer to the different services
available for maintaining the security and safety of an
organization.
Dr Shafiq 24
OSI Security Architecture
a) Authentication:
• Authentication is the process of verifying the identity
of a user or device in order to grant or deny access to
a system or device.
b) Authorizatin:
• Authorizatin is the process of granting access to a
user or device in order to grant or deny access to a
particular resource or asset in the system or device.
Dr Shafiq 25
OSI Security Architecture
c) Data Confidentiality :
• Data Confidentiality is responsible for the protection
of information from being accessed or disclosed to
unauthorized parties.
d) Data Integrity:
• Data integrity is a security mechanism that involves
the use of techniques to ensure that data has not been
tampered with or altered in any way during
transmission or storage.
Dr Shafiq 26
OSI Security Architecture
e) Non- repudiation:
• Non- repudiation involves the use of techniques to
create a verifiable record of the origin and
transmission of a message, which can be used to
prevent the sender from denying that they sent the
message.
f) Availability:
• Availibility means data or resource or system must be
available to legitimate user of the system.
Dr Shafiq 27
Questions
Any Question Please?
28
Further Readings
29
Thanks
30