Академический Документы
Профессиональный Документы
Культура Документы
Unit 1
The OSI Security Architecture: To assess the security requirements of an organization
the manager has to choose various products and define certain requirements and
characterize the approaches to satisfy these requirements. This is difficult for a centralized
data processing environment and the difficulty is compounded if there are LANs and
WANs. The ITU-T Recommendation X.800, Security Architecture for OSI defines such a
systematic approach to fulfill security requirements. It is an international standard.
Computer and communications vendors have designed their products to relate to these
security standards. OSI Architecture focuses on
(i)
(ii)
(iii)
(i)
Security Services
Security Mechanism
Security Attack.
Security Services:
(a) Data Confidentiality
(b) Authentication
(c) Data Integrity
(d) Non-repudiation
(e) Access Control
(a) Data Confidentiality
Protection of data from unauthorized disclosure.
1)
Information source
Information destination
Interruption
Interception
Modification
Fabrication.
i)
Interruption:
The computer system assets are made unusable or unavailable or destroyed. This is an
attack on availability. Examples are, destroying pieces of hardware like the hard disk,
cutting the communicating line or destroying the file management system.
ii) Interception:
iii) Modification:
Unauthorized party not only gains access to the assets but also tampers with it. This is
an attack on integrity. For example, changing values in a data file, altering a program
so that it performs differently, modifying the contents of messages being transmitted in
a network.
iv) Fabrication:
An unauthorized party inserts counterfeit objects into the system. This is an attack on
authenticity. For example, this involves insertion of spurious messages into the network or
addition of records in a file.
Passive threats
Passive attacks and Active attacks:
Interception
4
Traffic analysis
Active threats
Interruption
(Attack on availability)
Fabrication
Modification
(Attack on authenticity)
(Attack on
integrity)
Passive attacks use interception. Interception has two goals. One is the release of message
content. An email or a telephone conversation or a transmission of a file may contain
sensitive information. We should prevent the opponent from learning the contents of the
transmissions. Traffic analysis is more subtle and it is very difficult to detect. The
messages can be masked by using encryption, so that even if the opponent could access the
messages it would not be useful. Still, he can guess the nature of the message by getting to
know the location and identity of the hosts communication and the length and frequency of
the messages being transmitted. Emphasis is given to prevention rather than detection.
Active attacks are of four types.
1. Masquerade
2. Replay
3. Modification of the message
4. Denial of service.
1. Masquerade: One entity pretends to be another different entity. One entity
with few privileges captures the authentication sequences of another entity
and replays it thus enabling the entity with few privileges to gain more
privilege by impersonating the entity who has those privileges.
2. Replay: Replay is the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect.
Principal
Principal
Message
L
og
ic
al
in
fo
r
m
ati
on
ch
an
ne
l
Message
Secret information
Secret information
Opponent
Computing resources
(processor, memory, I/O)
Data
Opponent
-human
(ex. Cracker)
Processes
-software
Gate Keeper function
(ex. Virus,
Bindu
worm)
M.N. Department
of E & C, K.V.G.C.E., Sullia.
Access Channel
Software
The message is transferred from one party to another. The two parties involved are called
the principals. The communication link over which the message is transferred is called the
logical information channel. There should be an agreement between the two parties for the
communication to take place. The agreement is done in the form of a common protocol
such as the TCP/IP. The communication link is also called the internet. The logical
information channel is established by finding a route through the internet from the source
to the destination.
The security aspect comes into consideration when we want to protect the information
being transmitted over the channel from the opponent. The two aspects are:
1. Encryption: This is a method used to protect the information from being understood by
the opponent. It involves scrambling of the message before transmitting and descrambling
on reception. Also a code is introduced which identifies the sender.
2. Encryption Key: This is a common information shared by the sender and receiver or
the two principals and hopefully not known to the opponent. The key is used in conjunction
with transmission to scramble the message and to unscramble it at the receiving end.
A trusted third party is also involved in distributing the shared secret information
called the key and also to solve disputes between the two principals regarding authenticity.
The general model for security service performs the following major tasks:
1. Generates an algorithm to perform security related transformation. The algorithm
should be so designed such that the opponent cannot defeat its purpose.
2. Generating shared secret information by the two principals used with the algorithm.
3. Methods to distribute and share the secret information.
Unit 1 questions
1. List and describe the Services, Attacks and Mechanisms of the OSI Security
Architecture.