You are on page 1of 17

Computer Security

Group 5

Members
Prince Mupangavanhu – R192721N
Wayne Nzvere – R132500H
Nyasha P Muzeanenhamu – R191197V
Edwin M Muzeza – R1814999V
Anotida H.M Pasi – R1815002M
Clive Masawi – R1814915Q
Tatenda G Rufu – R193782A
Silvanos Dambwa – R192722A
Royal Guta – R193881Y
The OSI Security Architecture
Introduction
CHAPTER 2
 The OSI Security architecture
• Security attacks
• Security services
• Security mechanism
The OSI security architecture

 The OSI security architecture focuses on security attacks, mechanisms, and


services.

 Security attacks

Any action that compromises the security of information owned by an organization.

Two types of security attacks


a) Passive attack
b) active attack
Passive attack

 In a passive attack, the attacker monitors or eavesdrops the transmission between


and sender and receiver and the attacker try to retrieve the information being
transmitted. In passive attack neither the sender nor the receiver is aware of the
attack as the attacker only retrieve the message, he doesn’t perform any alteration
to the captured message. The message is sent and received in the normal fashion.

Two types of passive attacks are:


 Release of message contents
 and traffic analysis.
Passive attack

Release of message content


 The release of the message content is a kind of attack where the attacker listens to the

telephone conversation, tracks electronic mail or the transferred file to retrieve the
confidential message being transmitted. The opponent is quite interested in the content of
the released message.
Traffic analysis
 To protect the released message content the organization may apply a mask over the

content of the message so that even if the attacker captures the message, he would not be
able to understand the message. This technique of masking the released message is
termed as encryption.
 In traffic analysis passive attack, the attacker monitors the pattern, length and frequency

of the released message to guess the original message.


Passive attack
Active attack

Active attacks involve some modification of the data stream or the creation of a false
stream and can be subdivided into four categories :
 Masquerade ,
 Replay,
 Modification of messages,
 Denial of service.
Active attack

 Masquerade
In masquerade, the attacker pretends to be the sender.
 Replay

In the replay, the message is captured in a passive way and is retransmitted to produce an
unauthorized effect.

 Modification of message
Modification of message means some data stream of the message is altered or modified to create
an unauthorized effect.
 Denial of services

The attacker suppresses all the messages directed to a particular receiver by overloading the
network to degrade the network performance
Active attack
Active attack
Security service

X.800 and RFC 2828

 X.800 defines the service provided by protocol layer of communicating open


system which ensures adequate security of the systems or of data transfers.

 RFC 2828 defines as a communication service that is provided by a system to give


a specific kind of protection to system resources;
Security services are divided into
five categories

 Authentication
 Access control
 Data confidentiality
 Data integrity
 Nonrepudiation
Security services are divided into
five categories
 Authentication: It assures that the entity involves in the communication is the one it
is claiming for.
 Access Control: This service assures that only the authorized entities are accessing
the resources and prevents unauthorized access.
 Data Confidentiality: This service manages to maintain the confidentiality of data
by preventing the exposure of the message content to the attacker.
 Data Integrity: This service makes it sure that the data received at the receiver end
is from an authorized entity.
 Nonrepudiation: This service restricts the sending and receiving entity from
denying the transmitted message.
Security mechanism
Security mechanism is an entire process that is specifically designed to identify
the attack and develops a strategy to recover or prevent the attack. These security
mechanism consist of :

 Cryptographic techniques,
Process of converting ordinary plain text into unintelligible text and vice-versa.

 Encryption,
Security method of encoding data from plaintext to ciphertext, which can only be
decrypted by the user with the encryption key
Security mechanism

 Encipherment
The process of making data unreadable to unauthorized entities by applying
cryptographic algorithm

 Digital Signature
a mathematical technique used to validate the authenticity and integrity of a
message, software or digital document.

 Access Control
a method of guaranteeing that users are who they say they are and that they have
the appropriate access to company data.
Thank You

You might also like