The OSI Security Architecture

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Cryptography and Network Security Chapter 1
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Blekinge Institute of Technology, Sweden
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Applied Cryptography for Network Security
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Henric Johnson1 Network Security Henric Johnson Blekinge Institute of Technology, Sweden
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Presented by: Dr. Munam Ali Shah
Network Security Introduction
Network Security and Cryptography
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Information Security Principles course “Cryptology” Based of: “Cryptography and network Security” by William Stalling, 5th edition. Eng. Mohamed Adam Isak.
Cryptography and Network Security
Basic Communications Model Standards are needed at all Layers
Information Security Principles and Practices
By Marwan Al-Namari Author: William Stallings
Cryptography and Network Security
Information System and Network Security
The OSI Model.
Information Security.
CNET334 - Network Security
Introduction Of Information Security
10CS835 Information Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Lecture 1: Foundation of Network Security
Another perspective on Network Security
DATA COMMUNICATION Lecture-4.
Cryptography and Network Security
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Cryptography and Network Security
Security Mechanisms Network Security.
Counter With Cipher Block Chaining-MAC
Key Exchange, Man-in-the-Middle Attack
Challenges Of Network Security
Security Attacks Network Security.
Definition Of Computer Security
Cryptography and Network Security Chapter 1
Presentation transcript:

The OSI Security Architecture Network Security

The OSI Security Architecture Objectives of the Topic After completing this topic, a student will be able to describe the OSI security architecture and its usefulness.

The OSI Security Architecture Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

The OSI Security Architecture In an organization, the manager responsible for security has to effectively assess the security needs of an organization. He has to evaluate and choose various security products and policies.

The OSI Security Architecture Thus, the manager needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements.

The OSI Security Architecture This is difficult enough in a centralized data processing environment. With the use of local and wide area networks, the problems are compounded.

The OSI Security Architecture Such a systematic approach was defined by the International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T).

The OSI Security Architecture (ITU-T) is a United Nations sponsored agency that develops standards, called Recommendations, relating to telecommunications and to open systems interconnection (OSI).

The OSI Security Architecture Recommendation X.800, Security Architecture for OSI. The open systems interconnection (OSI) security architecture was developed in the context of the OSI protocol architecture.

The OSI Security Architecture OSI protocol architecture

The OSI Security Architecture The OSI security architecture is useful to managers as a way of organizing the task of providing security. It focuses on security attacks, mechanisms, and services. These are defined next:

The OSI Security Architecture Security Attack: Any action that compromises the security of information owned by an organization.

The OSI Security Architecture Security Mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

The OSI Security Architecture Security Service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.

The OSI Security Architecture The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

The OSI Security Architecture RFC 4949, Internet Security Glossary.

The OSI Security Architecture The OSI architecture is an international standard, computer and communications vendors have developed security features for their products and services that relate to this structured definition of services and mechanisms. End