SlideShare a Scribd company logo
1 of 14
   The OSI Security architecture
•   Security attacks
•   Security services
•   Security mechanism

   A model for network security
   The OSI security architecture focuses on
    security attacks, mechanisms, and services.

   Security attack:Any action that compromises
    the security of information owned by an
    organization.
    Two types of security attacks
     a) Passive attack
     b) active attack
   Passive attack attempts to learn or make use
    of information from the system but does not
    affect system resources.

   Two types of passive attacks are release of
    message contents and traffic analysis.
   Active attacks involve some modification of
    the data stream or the creation of a false
    stream and can be subdivided into four
    categories : masquerade
    , replay, modification of messages, and denial
    of service.
 X.800 defines it is the service provided by
  protocol layer of communicating open system
  which ensures adequate security of the
  systems or of data transfers.
 RFC 2828 defines as a communication service
  that is provided by a system to give a specific
  kind of protection to system resources;
 Authentication
 Access control
 Data confidentiality
 Data integrity
 Nonrepudiation
   Is a process that is designed to
    detect, prevent or recover from a security
    attack.

   Encipherment : It uses a mathematical
    algorithm to transfer the data into a form that
    can not be read by unauthorized user.

   Two types: Reversible encipherment
               Irreversible encipherment
   A security-related transformation on the
    information to be sent.

   Some secret information shared by the two
    principals and, it is hoped, unknown to the
    opponent.
Ppt.1

More Related Content

What's hot

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 

What's hot (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Security services
Security servicesSecurity services
Security services
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
IP Security
IP SecurityIP Security
IP Security
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Security policies
Security policiesSecurity policies
Security policies
 
Network security
Network securityNetwork security
Network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
Information security
Information securityInformation security
Information security
 
Pgp
PgpPgp
Pgp
 
CONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTIONCONVENTIONAL ENCRYPTION
CONVENTIONAL ENCRYPTION
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
System security
System securitySystem security
System security
 
Information security
Information securityInformation security
Information security
 
Ip security
Ip security Ip security
Ip security
 

Similar to Ppt.1

osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
kumarkaushal17
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
AparnaSunil24
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
Abiramis19
 

Similar to Ppt.1 (20)

Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Ch01
Ch01Ch01
Ch01
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 

Ppt.1

  • 1.
  • 2. The OSI Security architecture • Security attacks • Security services • Security mechanism  A model for network security
  • 3. The OSI security architecture focuses on security attacks, mechanisms, and services.  Security attack:Any action that compromises the security of information owned by an organization. Two types of security attacks a) Passive attack b) active attack
  • 4. Passive attack attempts to learn or make use of information from the system but does not affect system resources.  Two types of passive attacks are release of message contents and traffic analysis.
  • 5.
  • 6. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.
  • 7.
  • 8.
  • 9.  X.800 defines it is the service provided by protocol layer of communicating open system which ensures adequate security of the systems or of data transfers.  RFC 2828 defines as a communication service that is provided by a system to give a specific kind of protection to system resources;
  • 10.  Authentication  Access control  Data confidentiality  Data integrity  Nonrepudiation
  • 11. Is a process that is designed to detect, prevent or recover from a security attack.  Encipherment : It uses a mathematical algorithm to transfer the data into a form that can not be read by unauthorized user.  Two types: Reversible encipherment Irreversible encipherment
  • 12.
  • 13. A security-related transformation on the information to be sent.  Some secret information shared by the two principals and, it is hoped, unknown to the opponent.