SlideShare a Scribd company logo
1 of 14
   The OSI Security architecture
•   Security attacks
•   Security services
•   Security mechanism

   A model for network security
   The OSI security architecture focuses on
    security attacks, mechanisms, and services.

   Security attack:Any action that compromises
    the security of information owned by an
    organization.
    Two types of security attacks
     a) Passive attack
     b) active attack
   Passive attack attempts to learn or make use
    of information from the system but does not
    affect system resources.

   Two types of passive attacks are release of
    message contents and traffic analysis.
   Active attacks involve some modification of
    the data stream or the creation of a false
    stream and can be subdivided into four
    categories : masquerade
    , replay, modification of messages, and denial
    of service.
 X.800 defines it is the service provided by
  protocol layer of communicating open system
  which ensures adequate security of the
  systems or of data transfers.
 RFC 2828 defines as a communication service
  that is provided by a system to give a specific
  kind of protection to system resources;
 Authentication
 Access control
 Data confidentiality
 Data integrity
 Nonrepudiation
   Is a process that is designed to
    detect, prevent or recover from a security
    attack.

   Encipherment : It uses a mathematical
    algorithm to transfer the data into a form that
    can not be read by unauthorized user.

   Two types: Reversible encipherment
               Irreversible encipherment
   A security-related transformation on the
    information to be sent.

   Some secret information shared by the two
    principals and, it is hoped, unknown to the
    opponent.
Ppt.1

More Related Content

What's hot

Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardDr.Florence Dayana
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 

What's hot (20)

Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Cryptography
CryptographyCryptography
Cryptography
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cryptography
CryptographyCryptography
Cryptography
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 

Similar to Ppt.1

Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Nw sec
Nw secNw sec
Nw secshivz3
 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptxkumarkaushal17
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptshanthishyam
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network securitymohanad alobaidey
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementBhadra Gowdra
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfRhonda Cetnar
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.pptahmed127489
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS23017156038
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenAbiramis19
 

Similar to Ppt.1 (20)

Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Ch01
Ch01Ch01
Ch01
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
NS-Lec-01&02.ppt
NS-Lec-01&02.pptNS-Lec-01&02.ppt
NS-Lec-01&02.ppt
 
Network security in computer network for BS
Network security in computer network for BSNetwork security in computer network for BS
Network security in computer network for BS
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
 

Ppt.1

  • 1.
  • 2. The OSI Security architecture • Security attacks • Security services • Security mechanism  A model for network security
  • 3. The OSI security architecture focuses on security attacks, mechanisms, and services.  Security attack:Any action that compromises the security of information owned by an organization. Two types of security attacks a) Passive attack b) active attack
  • 4. Passive attack attempts to learn or make use of information from the system but does not affect system resources.  Two types of passive attacks are release of message contents and traffic analysis.
  • 5.
  • 6. Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories : masquerade , replay, modification of messages, and denial of service.
  • 7.
  • 8.
  • 9.  X.800 defines it is the service provided by protocol layer of communicating open system which ensures adequate security of the systems or of data transfers.  RFC 2828 defines as a communication service that is provided by a system to give a specific kind of protection to system resources;
  • 10.  Authentication  Access control  Data confidentiality  Data integrity  Nonrepudiation
  • 11. Is a process that is designed to detect, prevent or recover from a security attack.  Encipherment : It uses a mathematical algorithm to transfer the data into a form that can not be read by unauthorized user.  Two types: Reversible encipherment Irreversible encipherment
  • 12.
  • 13. A security-related transformation on the information to be sent.  Some secret information shared by the two principals and, it is hoped, unknown to the opponent.