0% found this document useful (0 votes)
71 views4 pages

Computer Security Concepts and OSI Architecture

The document outlines fundamental concepts of computer security, emphasizing the CIA Triad of confidentiality, integrity, and availability, along with additional security goals and key terms. It also introduces the OSI Security Architecture, detailing security services and mechanisms applicable at each layer of the OSI model. Practical examples and a structured approach to security implementation are provided to enhance understanding of cryptography and cyber security.

Uploaded by

pugazmani2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views4 pages

Computer Security Concepts and OSI Architecture

The document outlines fundamental concepts of computer security, emphasizing the CIA Triad of confidentiality, integrity, and availability, along with additional security goals and key terms. It also introduces the OSI Security Architecture, detailing security services and mechanisms applicable at each layer of the OSI model. Practical examples and a structured approach to security implementation are provided to enhance understanding of cryptography and cyber security.

Uploaded by

pugazmani2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Cryptography and Cyber Security - Unit

I Study Notes
Session 1: Computer Security Concepts

1. Introduction to Computer Security


Computer security involves the protection of:
- Data (in storage, processing, or transit)
- Systems (software, hardware, and firmware)
- Networks (communication channels and infrastructure)

The objective is to ensure confidentiality, integrity, and availability — commonly known as


the CIA Triad.

2. The CIA Triad


Term Description

Confidentiality Ensures that sensitive information is not


disclosed to unauthorized entities.

Integrity Ensures that data is accurate and not


altered by unauthorized parties.

Availability Ensures that systems and data are


accessible when needed by authorized
users.

3. Additional Security Goals


- Authenticity
- Accountability
- Non-repudiation

4. Key Terms and Concepts


Concept Description

Asset Anything valuable to an organization —


data, devices, software.

Threat Potential danger to data or systems.

Attack An actual attempt to violate security.


Vulnerability A weakness that can be exploited by an
attacker.

Risk The potential for loss or damage when a


threat exploits a vulnerability.

Countermeasure A safeguard to prevent or reduce the risk.

5. Types of Threats
- Passive Threats: Eavesdropping, traffic analysis
- Active Threats: Masquerade, replay, modification, DoS

6. Security Implementation Approaches


- Layered Security (Defense in Depth)
- Security Policy
- Security Mechanisms

7. Practical Examples
- Confidentiality: AES encryption
- Integrity: SHA-256 hashing
- Availability: Redundant networks

8. Summary
Security is not a single technology but a combination of policies, tools, and awareness.
Understanding basic concepts is foundational to studying cryptography and cyber security.

Session 2: The OSI Security Architecture

1. Overview
The OSI (Open Systems Interconnection) model provides a framework for standardizing
system functions into seven layers. The OSI Security Architecture (ITU-T X.800) describes
security services and mechanisms applicable at each layer.

2. Security Architecture Components


- Security Services
- Security Mechanisms
- Security Attacks

3. OSI Security Services (X.800)


Security Service Description

Authentication Assures the identity of communicating


entities.
Access Control Prevents unauthorized access to resources.

Data Confidentiality Protects data from unauthorized


disclosure.

Data Integrity Ensures data has not been altered during


transmission.

Non-repudiation Prevents entities from denying previous


commitments or actions.

4. Security Mechanisms (X.800)


Mechanism Description

Encipherment Encryption techniques to ensure


confidentiality.

Digital Signature Assures data integrity and origin


authentication.

Access Control Mechanisms Limits access to system resources.

Data Integrity Mechanisms Ensures data has not been tampered with.

Authentication Exchange Validates identities.

Traffic Padding Prevents traffic analysis.

Routing Control Prevents data from flowing through


insecure routes.

Notarization Trusted third-party validation.

5. Mapping OSI Layers to Security Needs


OSI Layer Security Needs

Application User authentication, data integrity

Presentation Encryption, formatting security

Session Session encryption/authentication

Transport Secure transmission (TLS/SSL)

Network Secure routing, IPsec

Data Link MAC layer encryption


Physical Physical security measures

6. Importance of OSI Security Architecture


- Structured approach
- Maps security requirements to OSI layers
- Standardizes threats and protections

7. Reference Source
William Stallings – Chapter 1 & 2:
- OSI layers
- ITU-T X.800 architecture
- Layered application of security

Common questions

Powered by AI

Beyond the CIA Triad, additional security goals such as authenticity, accountability, and non-repudiation play a crucial role in cybersecurity. Authenticity validates the identity of entities in communication, preventing masquerade attacks. Accountability involves tracking user actions, ensuring any malicious activities can be traced back to responsible parties. Non-repudiation prevents entities from denying actions taken or data sent, which is vital in legal or contractual contexts. These goals are significant because they provide a more comprehensive protection framework that addresses not only data protection but also trust and accountability in digital interactions .

The OSI Security Architecture is important in standardizing security practices as it provides a structured framework that maps security requirements to the OSI layers. This standardization enables organizations to adopt universally recognized security measures, ensuring compatibility and interoperability across different systems and technologies. It benefits organizations by clarifying how threats and protections align with system functions, improving the effectiveness of security implementations and facilitating comprehensive cybersecurity strategies .

Security mechanisms within the OSI Security Architecture provide the technical methods necessary to implement security services. For instance, encipherment ensures data confidentiality, while digital signatures confirm data integrity and origin authentication. These mechanisms interact with security services such as authentication, access control, and non-repudiation to form a comprehensive security framework that protects data at different OSI layers. By working together, these mechanisms and services enhance network security by systematically addressing potential vulnerabilities and securing communications .

Passive threats, such as eavesdropping and traffic analysis, impact an organization's cybersecurity strategy by necessitating measures to ensure data confidentiality and secure communication channels. For instance, encryption is crucial to mitigate these threats. Active threats, including masquerade, replay, modification, and Denial of Service (DoS) attacks, require more dynamic protective measures such as authentication protocols, integrity checks like SHA-256, and redundant systems for availability. Understanding and mitigating both threat types is essential for a robust cybersecurity strategy as they target different aspects of security—from confidentiality and integrity to availability .

Layered security, or Defense in Depth, enhances IT security by implementing multiple security measures across different layers of an IT system. This approach ensures that if one layer is compromised, others continue to provide protection. For example, using AES encryption provides confidentiality at the data level, firewalls offer network boundary protection, and user authentication systems secure access layers. This diversity in security controls makes it more difficult for an attacker to exploit vulnerabilities and ensures comprehensive protection .

Countermeasures are essential in mitigating cybersecurity risks as they are the safeguards put in place to prevent or lessen the impact of threats exploiting vulnerabilities. Effective countermeasures include encryption to protect data confidentiality, firewalls to prevent unauthorized access, and intrusion detection systems to monitor and alert for suspicious activities. By addressing specific vulnerabilities, these countermeasures reduce the likelihood and potential impact of cyber threats, thereby securing assets against identified risks .

In cybersecurity, a threat is any potential danger that can exploit a vulnerability, which is a weakness in a system. An attack is the actual event where a threat exploits a vulnerability. Risk is the potential for loss or damage when these elements interact. Understanding these concepts is crucial for organizations because it allows them to prioritize and implement countermeasures effectively, ensuring resources are allocated to mitigate the most critical vulnerabilities and threats, thereby enhancing overall security posture .

Security policies and security mechanisms jointly contribute by defining and enforcing the rules and technical processes needed for an effective cybersecurity framework. Security policies provide the guidelines and procedures for managing and protecting data and system resources. Security mechanisms, like encryption and authentication protocols, are the tools that implement these policies. Their interplay ensures that the strategic objectives of the policies are met through practical, enforceable means, leading to a comprehensive and coherent cybersecurity defensive posture .

Security needs differ across the OSI layers because each layer has distinct functions and vulnerabilities. For example, the Application layer requires user authentication and data integrity, while the Presentation layer focuses on encryption and formatting security. The Transport layer ensures secure transmission through protocols like TLS/SSL, and the Network layer necessitates secure routing methods such as IPsec. Tailoring security measures to each layer is important because it ensures that specific vulnerabilities are addressed appropriately, providing a thorough and effective security posture across the entire OSI model .

The CIA Triad, consisting of confidentiality, integrity, and availability, defines the primary objectives of computer security. Confidentiality ensures that sensitive information is not disclosed to unauthorized entities, which protects privacy and proprietary data. Integrity ensures that data remains accurate and unaltered by unauthorized parties, maintaining trust and reliability. Availability guarantees that systems and data are accessible to authorized users when needed, which is crucial for operational continuity. These objectives are critical for protecting organizational data because they address the fundamental requirements for safeguarding information assets against potential threats and vulnerabilities .

You might also like