UNIT-1 ch01
UNIT-1 ch01
Network Security
Fourth Edition
by William Stallings
Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Modification:
An unauthorized party not only accessing the information and also modifies
(tampers) the information and sends to destination is called modification.
RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
Security Services (X.800)
Authentication - assurance that the
communicating entity is the one claimed
Access Control - prevention of the
unauthorized use of a resource
Data Confidentiality –protection of data from
unauthorized disclosure
Data Integrity - assurance that data received is
as sent by an authorized entity
Non-Repudiation - protection against denial by
one of the parties in a communication
Security Mechanism
A process (or a device incorporating such
a process) that is designed to detect,
prevent, or recover from a security attack.
no single mechanism that will support all
services required
however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques
hence our focus on this topic
Security Mechanisms (X.800)
specific security mechanisms:
encipherment, digital signatures, access
controls, data integrity, authentication
exchange, traffic padding, routing control,
notarization
pervasive security mechanisms:
trusted functionality, security labels, event
detection, security audit trails, security
recovery
Model for Network Security
Model for Network Security
using this model requires us to:
1. design a suitable algorithm for the security
transformation
2. generate the secret information (keys) used
by the algorithm
3. develop methods to distribute and share the
secret information
4. specify a protocol enabling the principals to
use the transformation and secret
information for a security service
Model for Network Access
Security
Model for Network Access
Security
using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated
information or resources
trusted computer systems may be useful
to help implement this model
Summary
have considered:
definitions for:
• computer, network, internet security
X.800 standard
security attacks, services, mechanisms
models for network (access) security