SlideShare a Scribd company logo
1 of 14
   The OSI Security architecture
•   Security attacks
•   Security services
•   Security mechanism

   A model for network security
   The OSI security architecture focuses on
    security attacks, mechanisms, and services.

   Security attack:Any action that compromises
    the security of information owned by an
    organization.
    Two types of security attacks
     a) Passive attack
     b) active attack
   Passive attack attempts to learn or make use
    of information from the system but does not
    affect system resources.

   Two types of passive attacks are release of
    message contents and traffic analysis.
   Active attacks involve some modification of
    the data stream or the creation of a false
    stream and can be subdivided into four
    categories : masquerade
    , replay, modification of messages, and denial
    of service.
 X.800 defines it is the service provided by
  protocol layer of communicating open system
  which ensures adequate security of the
  systems or of data transfers.
 RFC 2828 defines as a communication service
  that is provided by a system to give a specific
  kind of protection to system resources;
 Authentication
 Access control
 Data confidentiality
 Data integrity
 Nonrepudiation
   Is a process that is designed to
    detect, prevent or recover from a security
    attack.

   Encipherment : It uses a mathematical
    algorithm to transfer the data into a form that
    can not be read by unauthorized user.

   Two types: Reversible encipherment
               Irreversible encipherment
   A security-related transformation on the
    information to be sent.

   Some secret information shared by the two
    principals and, it is hoped, unknown to the
    opponent.
Ppt.1

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Information and network security 8 security mechanisms
Information and network security 8 security mechanismsInformation and network security 8 security mechanisms
Information and network security 8 security mechanismsVaibhav Khanna
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Network security
Network securityNetwork security
Network securityAli Kamil
 

What's hot (20)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Information and network security 8 security mechanisms
Information and network security 8 security mechanismsInformation and network security 8 security mechanisms
Information and network security 8 security mechanisms
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
IP Security
IP SecurityIP Security
IP Security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Information security
Information securityInformation security
Information security
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Digital signature
Digital signatureDigital signature
Digital signature
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
system Security
system Security system Security
system Security
 
Security services
Security servicesSecurity services
Security services
 

Similar to Ppt.1

Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Nw sec
Nw secNw sec
Nw secshivz3
 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptxkumarkaushal17
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptshanthishyam
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network securitymohanad alobaidey
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementBhadra Gowdra
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfRhonda Cetnar
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.pptahmed127489
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS23017156038
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenAbiramis19
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 

Similar to Ppt.1 (20)

Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Ch01
Ch01Ch01
Ch01
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 

Ppt.1

  • 1.
  • 2. The OSI Security architecture • Security attacks • Security services • Security mechanism  A model for network security
  • 3. The OSI security architecture focuses on security attacks, mechanisms, and services.  Security attack:Any action that compromises the security of information owned by an organization. Two types of security attacks a) Passive attack b) active attack
  • 4. Passive attack attempts to learn or make use of information from the system but does not affect system resources.  Two types of passive attacks are release of message contents and traffic analysis.
  • 5.
  • 6. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.
  • 7.
  • 8.
  • 9.  X.800 defines it is the service provided by protocol layer of communicating open system which ensures adequate security of the systems or of data transfers.  RFC 2828 defines as a communication service that is provided by a system to give a specific kind of protection to system resources;
  • 10.  Authentication  Access control  Data confidentiality  Data integrity  Nonrepudiation
  • 11. Is a process that is designed to detect, prevent or recover from a security attack.  Encipherment : It uses a mathematical algorithm to transfer the data into a form that can not be read by unauthorized user.  Two types: Reversible encipherment Irreversible encipherment
  • 12.
  • 13. A security-related transformation on the information to be sent.  Some secret information shared by the two principals and, it is hoped, unknown to the opponent.