Unformatted text preview:

IntroductionX.800 – OSI Security ServicesSecurity ServicesAuthenticationAccess ControlData ConfidentialityData IntegrityNonrepudiationSecurity Mechanisms (X.800)Other Security Mechanisms (non X.800)PowerPoint PresentationNetwork Security ModelInternet OrganizationsRFC Publication ProcessIntroductionCS-480bDick SteflikX.800 – OSI Security Services •Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers•RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.Security Services•Authentication – assurance that the communicating entity is who they say they are•Access Control – prevent the unauthorized access to some system resource–Who can access–Under what conditions–What they are allowed to do•Data Confidentiality – protection of data from unauthorized disclosure•Data Integrity – insure that data received is exactely what was sent•Nonrepudiation – protection from denial by one of the entities involved in a communication of having participated in all or part of the communicationAuthentication•Peer Entity Authentication – in a connection based environment; provide confidence in the identity of a connecting entity –Logging in with a password–Gaining access via biological identity verification•DNA identification, retinal scan, finger/hand print identification–Access via audio voice identification•Data Origin Authentication – in a connectionless environment; provide assurance that the source of received data is as claimed–Corroborates the source of the data–Does not proved assurance against duplicate or modified dataAccess Control•This service provides protection against unauthorized use of resources accessible via OSI. These may be OSI or non-OSI resources accessed via OSI protocols. This protection service may be applied to various types of access to a resource or to all accesses to a resource–e.g., the use of a communications resource; the reading, the writing, or the deletion of an information resource; the execution of a processing resourceData Confidentiality•Connection Confidentiality–Protection of all user data on a connection•Connectionless Confidentiality–Protection of all data within a single data block•Selective-Field Confidentiality–Insure confidentiality of selected fields with within the user data on a connection or in a single data block connection •Traffic-Flow Confidentiality–Protection of information that might be derived by observing the traffic flow patternsData Integrity•Connection Integrity with Recovery–Detect any modification of stream data or replay of data and retry; •Connection Integrity without Recovery–Detect any modification and report it, no retry…continue on•Selective-Field Connection Integrity–Same except for selected fields•Connectionless Integrity–Detect modifications in fixed block connectionless data, may provide replay detection and protection•Selective-Field Connectionless Integrity–Same, except for selected fields •Total stream protection would encompass all of the above and is probably the best strategyNonrepudiation•Nonrepudiation, Origin–Proof that the message was sent by the specified party•Nonrepudiation, Destination–Proof that the message was received by the specified partySecurity Mechanisms (X.800)•Encipherment – algorithmic/mathematical conversion•Digital Signature – appending a secret signature•Access Control - •Access Control•Data Integrity•Authentication Exchange•Traffic Padding – appending extra chars to foil traffic analysis techniques•Routing Control – selection of secure routeds through the network•Notarization – use a trused 3rd party (like a notary public)Other Security Mechanisms (non X.800)•Trusted Functionality–That which is perceived to be true by some criteria (policy)•Security Label–The marking of (bound to) a resource that names or desiginates the security attributes of the resource•Event Detection–Intrusion detection–Detection of specific hacks (detector hardware)–Too many log in attempts•Security Audit Trail–Logging of all system events•Security Recovery–Recovery based on requests from security mechanisms and/or event handling.Network Security ModelM MM’ M’Info ChannelF(s) F(s)s sOpponentTrusted 3rd PartyF(s)-some function that mutates M into M’ based on sF(s) – some function that reverses the mutation of M’ back into MInternet Organizations•Internet Architecture Board (IAB) – responsible for the overall design of the Internet, provides guidance to IETF•Internet Engineering Task Force (IETF) – protocol engineering and development of the Internet–Working groups chartered by IETF do actual development work•Internet Draft, RFC, Standard•8 areas – General, Applications, Internet, Operations and management, Routing, Security, Transport, User Services–IETF responsible for actual publishing •Internet Engineering Steering Group (IESG) – responsible for technical management if IETF activities and the Internet Standards processRFC Publication ProcessInternet DraftProposed StandardDraft StandardInternet Standard HistoricBest Current PracticeExperimental


View Full Document

BU CS 455 - SecurityIntroduction

Download SecurityIntroduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SecurityIntroduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SecurityIntroduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?