Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Specific security mechanism

20/03/2021 Client: saad24vbs Deadline: 2 Day

RevisionSu2013

Security Architecture for OSI The ITU (International Telecommunications Union) is a United Nations sponsored

agency which develops standards (called recommendations) for telecommunications and

open systems interconnection (OSI). Recommendation X.800, Security Architecture for

OSI defines a systematic approach for the manager and technical professional responsible

for implementing security in a network, communications or computer environment to

systematically define the requirements for security and to characterize various approaches

to implement functionality that satisfies the requirements.

The framework provided by the architecture categorizes the elements of security into

security attacks, security services and security mechanisms.

A Security Attack is an action that compromises the information owned or entrusted to

the organization. The compromise affects some attribute of the CIA triad.

A Security Service is a collection of functionality (routines, programs, algorithms,

specifications) that provides support for various aspects of security: In order to protect a

network from attack, mechanisms need to be implemented that support each of these

services to the extent they are needed in the target environment. Security services are

implemented by making use of one or more security mechanisms.

Security Services:

 Authentication: The assurance the communicating entity is the one they claim to be.

 Access Control: Controls to prevent unauthorized use of a resource.

 Data Confidentiality: The protection of data from unauthorized disclosure.

 Availability: Assurance that computing resources and data are available.

 Data Integrity: The assurance that data that is sent/received/stored is exactly as it was sent/received/stored by the authorized entity.

 Nonrepudiation: Protection against denial by one or both parties in a communication that they sent or received all or part of it.

 Logging and Monitoring: Services that support the observation and logging of system activity.

The security services enumerated above are categories of services that are further divided

into specific services that apply to different aspects of a service. For example; the

authentication service is divided into two specific services peer entity authentication and

data origin authentication. Peer entity authentication involves each party in a logical

connection being able to confirm to some degree of confidence the identity of the other

party. Data origin authentication is used in a connectionless transfer such that the

recipient of the data can be confident in the identity of the sender.

RFC 2828 provides the following definition for a security service:

Definition: Security Service: A processing or communication service that is

provided by a system to give a specific kind of protection to system resources;

security services implement security policies by using security mechanisms.

A Security Mechanism is a particular technique or set of techniques that are used to

implement a security service.

Security mechanisms are divided into two groups: specific security mechanisms and

pervasive security mechanisms. A specific security mechanism is implemented in a

particular protocol layer or layers (e.g. TCP and/or application layer, etc.) to provide a

security service. For example: encipherment is a specific security mechanism that could

be implemented at various protocol layers. Encipherment may be implemented at the

application level using PGP, the transport layer using SSL and the IP layer using IPsec.

Specific Security Mechanisms:

 Encipherment: The use of cryptography to encrypt and decrypt information. Supports authentication, data confidentiality, data integrity.

 Digital Signature: The use of cryptography to compute a value and append it to a data object such that any recipient of the data can verify the data's

origin and integrity.

 Access Control: Numerous mechanisms that protect a system resource (control, data) from unauthorized use in accordance by the systems

security policy.

 Data Integrity: Numerous mechanisms that protect unauthorized changes to data, both malicious and accidental.

 Authentication exchange: Mechanisms used to ensure the identity of an entity.

 Traffic Padding: The generation of bits into a data stream to frustrate analysis of the data stream.

 Routing Control: Numerous mechanisms to control the path data takes from source to destination to ensure secure transmission of data.

 Notarization: Use of a trusted third party to assure or vouch for the integrity of a data exchange (i.e. Digital Certificates)

Pervasive security mechanisms are not specific to any protocol layer or security service.

The mechanism is implemented in any protocol layer and for any service.

Pervasive Security Mechanisms:

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quick Mentor
Top Essay Tutor
Financial Hub
Academic Mentor
Calculation Master
Professor Smith
Writer Writer Name Offer Chat
Quick Mentor

ONLINE

Quick Mentor

I have read your project details. I can do this within your deadline.

$58 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I will cover all the points which you have mentioned in your project details.

$28 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$23 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

I have read and understood all your initial requirements, and I am very professional in this task.

$40 Chat With Writer
Calculation Master

ONLINE

Calculation Master

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$27 Chat With Writer
Professor Smith

ONLINE

Professor Smith

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$20 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Surface leakage current in diode - Why did kentucky fried chicken change its name to kfc - Fixed wireless access definition - Patagonia culture case study - Project question related to a Hotel created were environmental factors are being considered - Abl online money transfer - Representing a democracy - Austin kelly lawyer irvine - Implement Communication VIA HTTP - Mametz wood owen sheers - Proactive police management 9th edition pdf - 16 24 lynette court buccan - Creac legal writing example - Newton's version of kepler's law - Task 8 redo - Topics to write speeches about - Costmart warehouse case answers - Which correctly demonstrates mla formatting - University of houston downtown blackboard - College land lease mildura fees - Civica document management system - Millburn academy higher maths - Buff beatnik project juice calories - Agno3 nacl ionic equation - Allstate bringing mayhem to the auto insurance advertising wars - Luther felt that music distracted from worship and should not be in church services. - Skyjack scissor lift service manual - What is the mission statement of apple inc - Korman company has the following securities in its portfolio - Operations consulting tool kit - Uts bachelor of engineering - Sue fraser ballarat psychologist - Brookstone management concepts fairfield nj glassdoor - Radiation exposure immediately around a properly functioning nuclear power plant is about - As 3600 concrete structures - Stack and queue using linked list in c - Levi's personal pair jeans case study pdf - Icare concept to interprofessional teams - Local store marketing guide - Duvall's theory - Knewton alta math answers - Blue ocean strategy tata nano - Conduct a value chain analysis of the walt disney co - ¿qué tiene julián en común con otras personas de su misma profesión? - Mine eyes are made the fools o the other senses - SOCW6510 - Conditions for total internal reflection - Assignment 1 OLTP VS OLAP - Mcdonalds beef lawsuit - Fireside tire company case study - Essay on housewife in english - Method of virtual work beams and frames - List the four possible subshells in the quantum-mechanical model. - Windows server deployment proposal - The blue people of troublesome creek worksheet - Themes of animal farm - Information Systems - Fencing knots figure 8 - Martha stout the sociopath next door pdf - 93 little hobart street welch wv - Individual & dual movement 4 - Peter senge 1990 the fifth discipline - Nova labs cyber security - Bell computers purchases integrated chips at $350 per chip - Super pinoy st albans - Ka ba and akh - Stella and blanche relationship - Cloud Computing - Drain the oceans hmas sydney - Pi is rational or irrational - Discussion board responses - Www educationplanner org students self assessments learning styles quiz shtml - Economics - Texts about human experiences - Prismaflex blood flow rate - 4 pages paper - Funny skits about shoes - Intermediate accounting chapter 23 statement of cash flows solutions - Break even sales under present and proposed conditions - Kahalagahan ng pag aaral ng ekonomiks - Who sent harry potter the invisibility cloak - Antibiotic resistance can we ever win case study answer key - 521 If you have not already commented on at least four peer presentations in the discussion board, please do so before Sunday, 11:59 p.m. (Pacific time). - Discussion Post 4 - Gibbs 1988 reflective cycle book - 10 Questions - 8.2 4.5 lab answers - Module 4 - Lecture Questions - Career quiz job outlook - El bebé estaba nombrado rodney cline carew en honor ___________. - Nazeing primary school newsletter - Pca 2 55 tcl eco - Uc riverside average gpa - Grammar boot camp worksheets - Atmega328 internal pull up resistor - Narangba aged care mumford road - Analyze your own leadership style - Volume and capacity stage 3 - American red cross swot analysis - M3:writing assignment #1