OSI Security Architecture
- 1. Inam Ul Haq
MS Computer Science (Sweden)
Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org
Discussion forum: questions.computingcage.com
Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia,
Michealjfox, Association for Information Systems and Internet Society.
Network Security
1 Network Security, University of Okara
Lecture 3: OSI Security Architecture
- 2. Table of Contents
Network Security, University of Okara2
OSI Security Architecture
4 Common Attacks
Handling Attacks
Exercise
- 3. OSI Security Architecture
Network Security, University of Okara3
An international and systematic standard of
defining and providing security requirements.
Used by IT managers and vendors in their
products
Proposed by ITU-T in recommendations X.800
as “Security Architecture for OSI”
security attack
security mechanism (control)
A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
security service
enhances the security of the data processing systems and the
information transfers of an organization
- 4. Security Mechanisms (X.800)
Network Security, University of Okara4
Specific Security Mechanisms:
encipherment, digital signatures, access controls, data
integrity, authentication exchange, traffic padding,
routing control, notarization
Pervasive Security Mechanisms:
trusted functionality, security labels, event detection,
security audit trails, security recovery
- 7. Handling Attacks
Network Security, University of Okara7
Passive attacks – focus on Prevention
Easy to stop
Hard to detect
Active attacks – focus on Detection and
Recovery
Hard to stop
Easy to detect
- 8. Exercise
Network Security, University of Okara8
1. What is the OSI security architecture?
2. What is the difference between passive and active
security threats?
3. List and briefly define categories of passive and
active security attacks.
4. List and briefly define categories of security
services.
5. List and briefly define categories of security
mechanisms.