What is Network Security? | Network Security Notes

Network Security:

Network security is an important field that is increasingly gaining attention as the internet expands. The field of network security consists of measures to detect, prevent and correct security violations that involve the transmission of information. Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could modify or forge your data, either for amusement or for their own benefit.

In simple terms, network security is securing the network. Network security protects your network and data from breaches, intrusions and other threats. It is the process of taking preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure. Implementing these measures allows computers, users and programs to perform their permitted critical functions within a secure environment.

Network security is the operation of protecting data, applications, devices, and systems that are connected to the network. Different policies and practices adopted to prevent any unauthorized access or misuse of computer networks and related resources are called network security. Also, it monitors the modifications made or the delay in the network used.

It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.

Network security entails protecting the usability, reliability, integrity, and safety of network and data. Effective network security defeats a variety of threats from entering or spreading on a network. The primary goal of network security are: Confidentiality, Integrity, and Availability.

Network security is a category of practices and technologies that keep internal networks protected from attacks and data breaches. It encompasses access control, cyber attack prevention, malware detection, and other security measures. An effective network security plan is developed with the understanding of security issues, potential attackers, needed level of security, and factors that make a network vulnerable to attack

Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and reinsert a false message. Securing the network is just as important as securing the computers and encrypting the message.

Network security is an organization’s strategy that guarantees the security of its assets, including all network traffic. It includes both software and hardware technologies. Access to the network is managed by adequate network security, which targets many threats and then arrests them from spreading or entering the network.

 

Role of Network Security:

The Role of network security includes the following:

  • Prevent unauthorized access to assets and data.
  • Protect network data, infrastructure, and all traffic from external threats.
  • Stop threats from spreading through the system.
  • Enable secure data sharing between systems and employees.
  • Grant users adequate access to resources.
  • Detect and respond to suspicious user behavior and software anomalies.
  • Scanning the network for viruses, Trojans, and other malicious software.
  • Creating new rules to protect against malware infections.
  • Monitoring the network for suspicious activity such as suspicious email attachments or suspicious website behaviour.

 

Need for Network Security:

 

The use of the Internet has increased drastically, as we are moving even our day-to-day activities towards complete digitalization. Due to the increase in the use of the Internet, hackers and attackers also become more active and our networking system tends to have a higher number of virus attacks.

Basically, the need for network security is to perform two tasks mainly, the first is to secure the information from any unauthorized access and the second is to provide the security to the data stored on PC or laptops not only for an individual network but also on the shared or public domain networks.

Network security is one of the most important aspects to consider when working over the internet. A stable and efficient network security system is essential to protecting client data. A good network security system helps business reduce the risk of falling victim of data theft and sabotage. Network security helps protect your workstations from harmful spyware. It also ensures that shared data is kept secure.

Network security ultimately protects the recognition of your organization. With hackers increasing and becoming smarter day by day, the need to utilize network security tools becomes more and more important.

 

Benefits of Network Security/ Importance of Network security:

Unless it’s properly secured, any network is vulnerable to malicious use and accidental damage. Hackers, disgruntled employees, or poor security practices within the organization can leave private data exposed, including trade secrets and customers’ private details.

The majority of common attacks against networks are designed to gain access to information, by spying on the communications and data of users, rather than to damage the network itself. But attackers can do more than steal data. They may be able to damage users’ devices or manipulate systems to gain physical access to facilities. This leaves the organization’s property and members at risk of harm.

Competent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals. More than that, it means that clients and partners can also interact with the organization confidently.

Network security tools and devices exist to help your organization protect not only its sensitive information but also its overall performance, reputation and even its ability to stay in business. Continued operational ability and an intact reputation are two key benefits of effective network security.

Secure and reliable networks protect not just organizational interests and operations, but also any client or customer who exchanges information with the organization, in addition to the general public. A well designed network security solution reduces overhead expenses and safeguards organizations from costly losses that occur from a data breach or other security incident.

 

Here’s why both businesses and households should consider the security of their networks seriously:

 

    To protect the computers in the network: Computers and other devices connected to unsecured networks are highly vulnerable to external threats such as malware, ransomware and spyware attacks. A single attack can bring down the entire computer system of an organization and compromise your personal information. By assuring the security of the network – typically with the assistance of a network security specialist – you can stay away from such expensive threats.

    To prevent identity theft: No matter whether you are an organization or an individual, your identity is valuable. If you log into an unsecured network, your identity can become visible to third-parties. To avoid such a situation, you should secure your network. Such an approach becomes mandatory if you are a business that deals with client information.

    To protect shared data: When it comes to a business, special precautions should be taken to protect shared data. And, network security is one of the best ways to do so. Network security can be applied with different restrictions on different computers depending on the types of files they handle.

    To stabilize the network connection: In an unrestricted, unprotected network, network activity can become too heavy. Intense traffic can lead to an unstable computer network. Eventually, the entire network will become vulnerable to various external attacks.



Goals of Network security or Objectives of Network Security:

Network security is the process through which a network is secured against internal and external threats of various forms. Network security is not only concerned about the security of the computers at each end of the communication chain; however, it aims to ensure that the entire network is secure.

Network security necessitates protecting the usability, stability, honesty, and security of network and also data. It aims to guarantee that the whole system is secure.

Network security entails protecting the usability, reliability, integrity, and safety of network and data. Effective network security defeats a variety of threats from entering or spreading on a network.

The primary goals of network security are Confidentiality, Integrity, and Availability. These three pillars of Network Security are often represented as CIA triad (CIA triangle).




   Confidentiality: The first goal of Network Security is "Confidentiality". Confidentiality means preserving authorized restrictions on information access and disclosure. Making sure people cannot attain the information they should not (keeping secrets).

 

It is the protection of data from unauthorized disclosure. Confidentiality can be defined as permitting approved users for accessing all sensitive as well as protected information. The confidentiality aspect of network security involves keeping the data private. 

 

The function of confidentiality is to protect precious business data from unauthorized persons. Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons. A loss of confidentiality is the unauthorized disclosure of information.

 

Confidentiality ensures that the information is not read by anyone for whom it was unintended and is read only by authorized parties. All information during the transaction has the request of being kept confidential. Information should not be accessible to unauthorized person. It should not be intercepted during transmission.

 

    Integrity: The second goal of Network Security is "Integrity". Integrity means guarding against improper information modification or destruction. Making sure people cannot change the information they should not (protecting data). Integrity aims at maintaining and assuring the accuracy and consistency of data.

 

The function of integrity is to make sure that the data is accurate and reliable and is not changed by unauthorized persons or hackers. The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data. A loss of integrity is the unauthorized modification or destruction of information.

 

Integrity ensures that the information wasn’t altered in storage or transit between sender and intended receiver. Information should not be altered during its transmission over the network. The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion or replay). Integration prevents the unauthorized modification of data.

 

 

    Availability: The third goal of network security is "Availability". As the name suggests, availability specifies whether the data or resource is available when required or requested by the client. Making sure people cannot stop the computer from doing its job.

 

Availability means ensuring timely and reliable access to and use of information. The function of availability in Network Security is to make sure that the data, network resources or network services are continuously available to the legitimate users, whenever they require it. A loss of availability is the disruption of access to or use of information or an information system.

 

Although the use of CIA triad to define security objectives is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows:

 

Authenticity: Authenticity is the property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. Authenticity ensures that the sender and receiver can confirm each others identity and the origin/destination of the information.

Authenticity is assurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity. We can verify authenticity through authentication. 

Authentication can be defined as the process of ensuring and confirming that the identity of the user is genuine and legitimate.  Authentication prevents impersonation and requires users to confirm their identities before being allowed access to systems and resources. This includes user names, passwords, emails, biometrics, and others.

 

Accountability: Accountability is the principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.

It is the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.


OSI Security Architecture:

OSI (Open System Interconnection) Security Architecture defines the well-planned standard architecture for security features in computer networking. 

It is a recommendation of the International Telecommunication Union which defines a systematic approach to define security requirements for a certain organization, as well as approaches to meet the aforementioned requirements.

The OSI security architecture provides a general description of security services and mechanisms, as well as a description of security attacks.


Classification of OSI Security Architecture:

OSI Security Architecture is categorized into three broad categories:





Security Attack: Any action that compromises the security of information owned by an organization.

Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.

Security Service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.


Security Attacks: 

A security attack means any action that puts the data or overall security of the system at risk. An attack might be successful or unsuccessful. In case of a successful attack, the attacker can complete his/her motive of breaking the security of the system in any way he/she wants to. In case of an unsuccessful attack, the system remains secured and no harm to the security is done.

 A useful means of classifying security attacks, used both in X.800 and RFC 4949, is in terms of passive attacks and active attacks.


Passive Attacks:

In passive network attacks, attackers gain unauthorized access to a network and can monitor or steal sensitive information, without making any alterations.

In passive attack a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose of a passive attack is to gain information about the system being targeted; it does not involve any direct action on the target. The attacker does not modify or corrupt the data. No changes are made to the data.

A Passive attack attempts to learn or make use of information from the system but does not affect system resources. There are 2 types of passive attacks.

  • Release of message content
  • Traffic analysis

 

Release of message content:  Telephonic conversation, an electronic mail message, or a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions. 

 

Traffic Analysis: As the name suggests, this attack focuses on the amount or volume of data sent between the sender and the receiver. The attacker can predict a lot of information about the sender and the receiver by knowing the amount of data sent. For example, if a lot of data is being sent from the sender to the receiver, it is assumed as there is an emergency, or a task is happening on an urgent basis. If less data is shared between the sender and the receiver, it is assumed that there is a lack of communication and so on.

Suppose that we had a way of masking (encryption) information, so that the attacker even if captured the message could not extract any information from the message. 
The opponent could determine the location and identity of communicating host and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place. 


Active Attacks:

In active attacks attackers not only gain unauthorized access but also modify data either deleting, encrypting or otherwise harming it. Attackers gain unauthorized access to the network and then modify data (say, via encryption) to compromise it and affect its usability and value.

An Active attack attempts to alter system resources or affect their operations. Active attacks involve some modification of the data stream or the creation of false statements.

Active attacks are subdivided into four categories:

  • Masquerade
  • Replay
  • Modification of messages
  • Denial of Service

 

Masquerade: A masquerade attack takes place when one entity pretends to be a different entity.  In this attack too, the attacker acts to be an authorized user. A Masquerade attack involves one of the other forms of active attacks.  If an authorization procedure isn’t always absolutely protected, it is able to grow to be extraordinarily liable to a masquerade assault. Masquerade assaults may be performed using the stolen passwords and logins, with the aid of using finding gaps in programs, or with the aid of using locating a manner across the authentication process.

 

Modification of messages: It means that some portion of a message is altered or that message is delayed or reordered to produce an unauthorized effect. Modification is an attack on the integrity of the original data. It basically means that unauthorized parties not only gain access to data but also spoof the data by triggering denial-of-service attacks, such as altering transmitted data packets or flooding the network with fake data.

 

Replay: It involves the passive capture of a message and its subsequent transmission to produce an authorized effect. In this attack, the basic aim of the attacker is to save a copy of the data originally present on that particular network and later on use this data for personal uses. Once the data is corrupted or leaked it is insecure and unsafe for the users.

 

Denial of Service: The denial-of-service (DoS) attack is an attack in which a system is attacked by a lot of requests to the system at one time that it is not able to handle. The attacker sends multiple requests to the server at the same time and the server is not able to handle such requests. However, this attack is easily identifiable as these loads of requests come from a single sender (the attacker) and it is easy to identify the source of the attack.

 

It prevents the normal use of communication facilities. This attack may have a specific target. For example, an entity may suppress all messages directed to a particular destination. Another form of service denial is the disruption of an entire network either by disabling the network or by overloading it with messages so as to degrade performance. 

 

Denial of service is a method used by hackers to send a large number of automated requests to a website. To the website server, these requests seem to originate from genuine visitors. So the website server attempts to respond to the requests. But the sheer volume overwhelms the server. Although a DoS attack does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming and files in affected computer systems.



Security Services:


X.800 defines a security service as a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems of data transfers.

RFC 4949 defines a security service as a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented by security mechanism.

Security service is a processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. These are the services that are used for maintaining security. These security services can be implemented in various layers of the OSI model.

X.800 divides security services into 5 categories and 14 specific services.

Authentication:

The authentication service is concerned with assuring that a communication is authentic. Authentication is the assurance that the communicating entity is the one that it claims to be.

In the case of a single message, such as a warning or alarm signal, the function of the authentication service is to assure the recipient that the message is from the source that it claims to be from.

In the case of an ongoing interaction, such as the connection of a terminal to a host, two aspects are involved. First, at the time of connection initiation, the service assures that the two entities are authentic, that is, that each is the entity that it claims to be. Second, the service must assure that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties for the purposes of unauthorized transmission or reception.


Two specific authentication services are defined in X.800:

Peer Entity Authentication: Provides for the corroboration of the identity of a peer entity in an association. It attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection.

Peer entity authentication used in association with a logical connection to provide confidence in the identity of the entities connected. It is the process of verifying that a peer entity in an association is as claimed.

Peer entity authentication means verifying the identity of one entity by another.

Data Origin Authentication: Provides for the corroboration of the source of a data unit.  In a connectionless transfer, provides assurance that the source of received data is as claimed.

Data origin authentication means verifying the origin of received data.  It does not provide protection against the duplication or modification of data units. This type of service supports applications like electronic mail, where there are no prior interactions between the communicating entities.

 

Access Control:

The prevention of unauthorized use of a resource i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do.

In the context of network security, access control is the ability to limit and control the access to host systems and applications via communications links. 

In an organization, various levels of employees have various levels of access to the system. For example, in a company, a software engineer has limited access to the system as compared to the product manager and the product manager has limited access as compared to the CTO of the company.


Data Confidentiality:

This is one of the three pillars of the security model CIA (Confidentiality, Integrity, and Availability). Confidentiality means that the data shared between a sender and receiver should be confidential to them only. No third party should be able to read the data. Confidentiality is the protection of data from unauthorized disclosure. When preventing disclosure of information to unauthorized parties is needed, the property of confidentiality is required.

To provide confidentiality, the cryptographic algorithm and mode of operation needs to be designed and implemented in such a way that an unauthorized party will be unable to determine the keys that have been associated with the encryption or have the ability to derive the information without using the correct keys.

Confidentiality is the protection of transmitted data from passive attacks. With respect to the content of a data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period of time. For example, when a TCP connection is set up between two systems, this broad protection prevents the release of any user data transmitted over the TCP connection. Narrower forms of this service can also be defined, including the protection of a single message or even specific fields within a message. The other aspect of confidentiality is the protection of traffic flow from analysis. This requires that an attacker not be able to observe the source and destination, frequency, length, or other characteristics of the traffic on a communications facility.

Connection Confidentiality: The protection of all user data on a connection.

Connectionless Confidentiality: The protection of all user data in a single data block

Selective-Field Confidentiality: The confidentiality of selected fields within the user Data on a connection or in a single data block.

Traffic Flow Confidentiality: The protection of the information that might be derived from observation of traffic flows.

 

Data Integrity: 

This is the second pillar of the CIA. Here, integrity means that no third party should be able to modify the data shared between the sender and the receiver.

Data integrity is the assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay).

As with confidentiality, integrity can apply to a stream of messages, a single message, or selected fields within a message. Again, the most useful and straightforward approach is total stream protection.

A connection-oriented integrity service, one that deals with a stream of messages, assures that messages are received as sent with no duplication, insertion, modification, reordering, or replays. The destruction of data is also covered under this service. Thus, the connection-oriented integrity service addresses both message stream modification and denial of service. On the other hand, a connectionless integrity service, one that deals with individual messages without regard to any larger context, generally provides protection against message modification only. We can make a distinction between service with and without recovery.

Because the integrity service relates to active attacks, we are concerned with detection rather than prevention. If a violation of integrity is detected, then the service may simply report this violation, and some other portion of software or human intervention is required to recover from the violation. Alternatively, there are mechanisms available to recover from the loss of integrity of data, as we will review subsequently. The incorporation of automated recovery mechanisms is, in general, the more attractive alternative

Connection Integrity with Recovery: Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted.

 Connection Integrity without Recovery: As above, but provides only detection without recovery.

Selective-Field Connection Integrity: Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.

Connectionless Integrity: Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided.

Selective-Field Connectionless Integrity: Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified.

 

Non- Repudiation:

Non-repudiation provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. It prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender.

Non-Repudiation ensures that the sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information.

Non-repudiation, Origin: Proof that the message was sent by the specified party.

Non-repudiation, Destination: Proof that the message was received by the specified party.

 

 

Security Mechanisms:

Security mechanisms are technical tools and techniques that are used to implement security services. The security mechanisms provide a way of preventing, protecting and detecting attacks.

Security mechanism is designed to detect, prevent, or recover from a security attack. The mechanisms that help in setting up the security services in different layers of the OSI model and that help in identifying any attack or data breach are called security mechanisms.

Security mechanisms are the specific means of implementing one or more security services. The mechanisms are divided into those that are implemented in a specific protocol layer and those that are not specific to any particular protocol layer or security service.


The security mechanisms defined in X.800 are explained below:

Specific Security Mechanisms:

Specific security mechanisms may be incorporated into the appropriate protocol layer in order to provide some of the security services. 

The OSI security architecture enumerates eight specific security mechanisms.


Encipherment: This security mechanism deals with hiding and covering of data which helps data to become confidential. It is achieved by applying mathematical calculations or algorithms which reconstruct information into not readable form.

One of the most popular security mechanisms is encryption. The message/data sent from the sender to the receiver is usually encrypted to some format that even if the message is stolen, cannot be decrypted easily by the attacker. Some of the popular encryption algorithms are AES, RSA, Triple DES, etc.


Digital Signature: A digital signature is an analytical approach which validates the authenticity and integrity of a message, application or digital records. It allows us to test the author name, date and time of signatures, and verify the message text.

The digital signature supports far more basic security and designed to solve the problem of tampering and impersonation (deliberately copy another person's features) in electronic connection.

Data or cryptographic transformation of an information unit is additional to the data, therefore that the recipient of the information unit is converted of the source and integrity of the information unit and this can also serve to secure the data against forgery (such as by the recipient).


 

Access Control: Access control is an information security process that enables organizations to manage who is authorized to access corporate data and resources.

Secure access control need policies that check users are who they claim to be and support proper control access levels are allowed to users. There are several structure are available that accomplish access rights to resources.

 

This mechanism is used to stop unattended access to data which you are sending. It can be achieved by various techniques such as applying passwords, using firewall, or just by adding PIN to data.


 

Data Integrity: Integrity can use to a flow of messages, an individual message, or selected areas inside a message. In data integrity, it is a connection-oriented integrity service, it can handle with a flow of messages, and assure that messages are received as sent with no duplication, insertion, modification, reordering, or replays.


Authentication Exchange: A mechanism intended to ensure the identity of an entity by means of information exchange. Such a mechanism consists of an exchange of messages between a pair of entities.

This security mechanism deals with identity to be known in communication. This is achieved at the TCP/IP layer where two-way handshaking mechanism is used to ensure data is sent or not.


Traffic Padding: Traffic padding mechanisms are used to protect against traffic analysis attacks. 

The sender and receiver send the data to each other. Now, sometimes there is a gap between the sender and receiver. This means that for some time when the sender and receiver are not sharing the data, the attacker can act as if it is the sender and send some data to the receiver to attack it. So, this can be avoided if the gap (empty time) between the sender and the receiver is not known to the attacker. For this, during the gap duration, the sender keeps on sending some dummy data to the receiver and the receiver knows that this is the dummy data by using some identification. Hence, no gap is created between the sender and the receiver and the attacker cannot attack the system.


Routing Control: Routing control enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected.

The messages that a sender sends to a receiver travel different routes, however, in some cases, the sender and receiver might communicate mostly via the same route. In this case, the attacker tracks this route and can make changes to the data or take advantage of this. So, routing should be controlled in such a way that mostly, a different route is selected between the sender and the receiver to deliver the message.


Notarization: Notarization is the usage of a trusted third party to assure certain properties of a data exchange.

This security mechanism involves use of trusted third party in communication. It acts as mediator between sender and receiver so that if any chance of conflict is reduced. This mediator keeps record of requests made by sender to receiver for later denied.

Notarization mechanisms can be used to assure certain properties of the data communicated between two or more entities, such as its integrity, origin, time, or destination. The assurance is provided by a trusted third party (TTP) in a testifiable manner.


Pervasive Security Mechanisms:

Pervasive security mechanisms are not specific to any particular security service. The OSI security architecture enumerates five pervasive security mechanisms

Trusted Functionality: Trusted functionality is the process which is perceived to be correct with respect to some criteria (e.g., as established by a security policy).

 

The general concept of trusted functionality can be used to either extend the scope or to establish the effectiveness of other security mechanisms. Any functionality that directly provides, or provides access to, security mechanisms should be trustworthy.

 

 

Security Label: This is an approach of marking bound to a resource (which may be a data unit) that names or designates the security attributes of that resource.

 

System resources may have security labels associated with them, for example, to indicate sensitivity levels. It is often necessary to convey the appropriate security label with data in transit. A security label may be additional data associated with the data transferred or may be implicit (e.g., implied by the use of a specific key to encipher data or implied by the context of the data such as the source address or route).

 

 

Event Detection: Detection of security-relevant events including forgery, denial of sending or receiving of information, modification of information etc.


 

Security Audit Trail: A security audit refers to an independent review and examination of system records and activities to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy, and procedures. Consequently, a security audit trail refers to data collected and potentially used to facilitate a security audit.

 

It supports a valuable security mechanism, as possibly they allow detection and analysis of breaches of security by allowing a subsequent security audit. A security audit is an independent report and investigation of system data and events in order to test for sufficiency of system controls, to provide compliance with established policy and operational processes, to help in loss assessment and to approve some indicated changes in controls, policy and processes.

 

Security Recovery: Security recovery deals with requests from mechanisms such as event handling and management functions, and takes recovery actions as the result of applying a set of rules.



Relationship between Security Services and Mechanisms:

Security services and mechanisms are closely related because a mechanism or combinations of mechanisms are used to provide a service.

Security mechanisms are technical tools and techniques that are used to implement security services. A mechanism might operate by itself, or with others, to provide a particular service.


Service

Mechanism

 

Encipherment (Encryption)

Digital signature

Access control

Data integrity

Authentication exchange

Traffic padding

Routing Control

Notarization

Peer entity authentication

Y

Y

 

 

Y

 

 

 

Data origin authentication

Y

Y

 

 

 

 

 

 

Access control

 

 

Y

 

 

 

 

 

Confidentiality

Y

 

 

 

 

 

Y

 

Traffic flow confidentiality

Y

 

 

 

 

Y

Y

 

Data integrity

Y

Y

 

Y

 

 

 

 

Nonrepudiation

 

Y

 

Y

 

 

 

Y

Availability

 

 

 

Y

Y

 

 

 





Post a Comment

0 Comments