OSI Security Architecture - PowerPoint PPT Presentation

About This Presentation
Title:

OSI Security Architecture

Description:

Lecture 3 – PowerPoint PPT presentation

Number of Views:1346
Slides: 9
Provided by: inam12
Tags:

less

Transcript and Presenter's Notes

Title: OSI Security Architecture


1
Network Security
Lecture 3 OSI Security Architecture
  • Inam Ul Haq
  • MS Computer Science (Sweden)
  • Inam.bth_at_gmail.com, mr.inam.ulhaq_at_ieee.org
  • Discussion forum questions.computingcage.com
  • Member of IEEE, ACM, Movement Disorder Society,
    PDF, BossMedia, Michealjfox, Association for
    Information Systems and Internet Society.

2
Table of Contents
  • OSI Security Architecture
  • 4 Common Attacks
  • Handling Attacks
  • Exercise

3
OSI Security Architecture
  • An international and systematic standard of
    defining and providing security requirements.
  • Used by IT managers and vendors in their products
  • Proposed by ITU-T in recommendations X.800 as
    Security Architecture for OSI
  • security attack
  • security mechanism (control)
  • A process (or a device incorporating such a
    process) that is designed to detect, prevent, or
    recover from a security attack.
  • security service
  • enhances the security of the data processing
    systems and the information transfers of an
    organization

4
Security Mechanisms (X.800)
  • Specific Security Mechanisms
  • encipherment, digital signatures, access
    controls, data integrity, authentication
    exchange, traffic padding, routing control,
    notarization
  • Pervasive Security Mechanisms
  • trusted functionality, security labels, event
    detection, security audit trails, security
    recovery

5
4 Common Types of Threats
6
4 Common Types of Threats (2)
7
Handling Attacks
  • Passive attacks focus on Prevention
  • Easy to stop
  • Hard to detect
  • Active attacks focus on Detection and Recovery
  • Hard to stop
  • Easy to detect

8
Exercise
  • 1. What is the OSI security architecture?
  • 2. What is the difference between passive and
    active security threats?
  • 3. List and briefly define categories of passive
    and active security attacks.
  • 4. List and briefly define categories of security
    services.
  • 5. List and briefly define categories of security
    mechanisms.
Write a Comment
User Comments (0)
About PowerShow.com