general security concepts

25
General Security Concepts

Upload: darby

Post on 22-Feb-2016

45 views

Category:

Documents


0 download

DESCRIPTION

General Security Concepts. Contents. Computer Security Concepts The OSI Security Architecture Security Attacks Security Services Security Mechanisms A Model for Network Security. KEY POINTS. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: General Security Concepts

General Security Concepts

Page 2: General Security Concepts

2

Contents

1. Computer Security Concepts2. The OSI Security Architecture3. Security Attacks4. Security Services5. Security Mechanisms6. A Model for Network Security

Page 3: General Security Concepts

3

KEY POINTS

The Open Systems Interconnection (OSI) security architecture provides a systematic framework for defining security attacks, mechanisms, and services.

Security attacks are classified as either passive attacks, which include unauthorized reading of a message of file and traffic analysis or active attacks, such as modification of messages or files, and denial of service.

A security mechanism is any process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. Examples of mechanisms are encryption algorithms, digital signatures, and authentication protocols.

Security services include authentication, access control, data confidentiality, data integrity, nonrepudiation, and availability.

Page 4: General Security Concepts

4

1. COMPUTER SECURITY CONCEPTS

COMPUTER SECURITY: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

This definition introduces three key objectives that are at the heart of computer security:

Confidentiality Integrity Availability

Page 5: General Security Concepts

5

Confidentiality: Data confidentiality, Privacy

Integrity: Data integrity, System integrity

Availability.

CIA triad (Figure 1.1)

Page 6: General Security Concepts

6

Although the use of the CIA triad to define security objectives is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows:

Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source

Page 7: General Security Concepts

7

Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.

Page 8: General Security Concepts

8

2. THE OSI SECURITY ARCHITECTURE

Threats and Attacks (RFC 2828) Threat: A potential for violation of security, which exists

when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.

Attack: An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.

Page 9: General Security Concepts

9

The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as

Security attack: Any action that compromises the security of information owned by an organization.

Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

Page 10: General Security Concepts

10

3. SECURITY ATTACKS

Passive Attacks: Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis.

Page 11: General Security Concepts

11

Page 12: General Security Concepts

12

Page 13: General Security Concepts

13

Active Attacks

Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service.

Masquerade (Figure 1.3a) Replay (Figure 1.3b) Modification of messages (Figure 1.3c) Denial of service (Figure 1.3d)

Page 14: General Security Concepts

14

Page 15: General Security Concepts

15

Page 16: General Security Concepts

16

Page 17: General Security Concepts

17

Page 18: General Security Concepts

18

4. SECURITY SERVICES

Page 19: General Security Concepts

19

Page 20: General Security Concepts

20

Page 21: General Security Concepts

21

Page 22: General Security Concepts

22

5. SECURITY MECHANISMS

Page 23: General Security Concepts

23

Page 24: General Security Concepts

6. A MODEL FOR NETWORK SECURITY

24

Page 25: General Security Concepts

25