Professional Documents
Culture Documents
Lecture 3
Introduction – Cont’d
Overview
Computer Security Research Group
Security Services
Reading
Security Mechanisms Assignment
A model for Network Security
A telephone conversation, an
electronic mail message and a
transferred file may contain sensitive
or confidential information. We would
like to prevent the opponent from
learning the contents of these
transmissions.
Traffic Analysis
Computer Security Research Group
Active Attacks
Computer Security Research Group
Masquerade
Computer Security Research Group
Replay
Computer Security Research Group
Modification of Messages
Computer Security Research Group
Denial of Service
Computer Security Research Group
NOTE
Computer Security Research Group
passive attacks.
Where as passive attacks are difficult to detect,
AUTHENTICATION
Computer Security Research Group
AUTHENTICATION
Computer Security Research Group
2. Data-Origin authentication:
Provides for the corroboration of the source of a
data unit. It does not provide protection against
the duplication or modification of data units.
This type of service supports applications like
electronic mail, where there are no prior
interactions between the communicating entities.
In a connectionless transfer, it provides
assurance that the source of received data is
claimed.
ACCESS CONTROL
Computer Security Research Group
DATA CONFIDENTIALITY
Computer Security Research Group
Review Questions
1.What is the OSI Security Architecture?
Computer Security Research Group
Succeed We Must
Computer Security Research Group
Any Questions?