Chapter 1 Class
Chapter 1 Class
Security
Chapter 1
Fifth Edition
by William Stallings
Security: is ensuring the (Secrecy)
confidentiality, data integrity and
availability of components of
.computing system
Cryptographic algorithms and protocols can
:be grouped into four main areas
Definitions
Normal Flow:
Network Security
Wiring,
eavesdrop
3. Modification: unauthorized changing of
data or tempering with services, such as
alteration of data, modification of
messages, etc.
Replaced
intercept
info
4. Fabrication: additional data or activities
are generated that would normally no
exist, such as adding a password to a
system, replaying previously send
messages, etc.
• RFC 4949 :
“a processing or communication service provided by
a system to give a specific kind of protection to
system resources”
Security Services (X.800)
• Authentication - assurance that the
communicating entity is the one claimed
There are two specific authentication services defined in X.800:
1. Peer entity authentication:- Provides for the corroboration
of the entity of a peer entity in association.
2. Data origin authentication:- provides for the corroboration
of the source of a data units.
Security Services (X.800)
• Access Control - prevention of the
unauthorized use of a resource
• Data Confidentiality –protection of data from
unauthorized disclosure
• Data Integrity - assurance that data received
is as sent by an authorized entity
• Non-Repudiation - protection against denial
by one of the parties in a communication
Security Mechanism
• feature designed to detect, prevent, or
recover from a security attack
• no single mechanism that will support all
services required
• however one particular element underlies
many of the security mechanisms in use:
– cryptographic techniques
• hence our focus on this topic
Security Mechanisms (X.800)
• specific security mechanisms:
– encipherment, digital signatures, access controls,
data integrity, authentication exchange, traffic
padding, routing control, notarization
• pervasive security mechanisms:
– trusted functionality, security labels, event
detection, security audit trails, security recovery
Model for Network Security
Model for Network Security
• using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used by
the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Access Security
Model for Network Access Security
• using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information
or resources
• trusted computer systems may be useful to
help implement this model
Summary
• have considered:
– definitions for:
• computer, network, internet security
• X.800 standard
• security attacks, services, mechanisms
• models for network (access) security