Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Specific security mechanism

27/03/2021 Client: saad24vbs Deadline: 2 Day

Security Architecture for OSI

Week7 Part3-IS

RevisionSu2013

Security Architecture for OSI The ITU (International Telecommunications Union) is a United Nations sponsored

agency which develops standards (called recommendations) for telecommunications and

open systems interconnection (OSI). Recommendation X.800, Security Architecture for

OSI defines a systematic approach for the manager and technical professional responsible

for implementing security in a network, communications or computer environment to

systematically define the requirements for security and to characterize various approaches

to implement functionality that satisfies the requirements.

The framework provided by the architecture categorizes the elements of security into

security attacks, security services and security mechanisms.

A Security Attack is an action that compromises the information owned or entrusted to

the organization. The compromise affects some attribute of the CIA triad.

A Security Service is a collection of functionality (routines, programs, algorithms,

specifications) that provides support for various aspects of security: In order to protect a

network from attack, mechanisms need to be implemented that support each of these

services to the extent they are needed in the target environment. Security services are

implemented by making use of one or more security mechanisms.

Security Services:

 Authentication: The assurance the communicating entity is the one they claim to be.

 Access Control: Controls to prevent unauthorized use of a resource.

 Data Confidentiality: The protection of data from unauthorized disclosure.

 Availability: Assurance that computing resources and data are available.

 Data Integrity: The assurance that data that is sent/received/stored is exactly as it was sent/received/stored by the authorized entity.

 Nonrepudiation: Protection against denial by one or both parties in a communication that they sent or received all or part of it.

 Logging and Monitoring: Services that support the observation and logging of system activity.

The security services enumerated above are categories of services that are further divided

into specific services that apply to different aspects of a service. For example; the

authentication service is divided into two specific services peer entity authentication and

data origin authentication. Peer entity authentication involves each party in a logical

connection being able to confirm to some degree of confidence the identity of the other

party. Data origin authentication is used in a connectionless transfer such that the

recipient of the data can be confident in the identity of the sender.

RFC 2828 provides the following definition for a security service:

Definition: Security Service: A processing or communication service that is

provided by a system to give a specific kind of protection to system resources;

security services implement security policies by using security mechanisms.

A Security Mechanism is a particular technique or set of techniques that are used to

implement a security service.

Security mechanisms are divided into two groups: specific security mechanisms and

pervasive security mechanisms. A specific security mechanism is implemented in a

particular protocol layer or layers (e.g. TCP and/or application layer, etc.) to provide a

security service. For example: encipherment is a specific security mechanism that could

be implemented at various protocol layers. Encipherment may be implemented at the

application level using PGP, the transport layer using SSL and the IP layer using IPsec.

Specific Security Mechanisms:

 Encipherment: The use of cryptography to encrypt and decrypt information. Supports authentication, data confidentiality, data integrity.

 Digital Signature: The use of cryptography to compute a value and append it to a data object such that any recipient of the data can verify the data's

origin and integrity.

 Access Control: Numerous mechanisms that protect a system resource (control, data) from unauthorized use in accordance by the systems

security policy.

 Data Integrity: Numerous mechanisms that protect unauthorized changes to data, both malicious and accidental.

 Authentication exchange: Mechanisms used to ensure the identity of an entity.

 Traffic Padding: The generation of bits into a data stream to frustrate analysis of the data stream.

 Routing Control: Numerous mechanisms to control the path data takes from

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Accounting & Finance Master
Writing Factory
Engineering Help
24/7 Assignment Help
Top Writing Guru
Assignments Hut
Writer Writer Name Offer Chat
Accounting & Finance Master

ONLINE

Accounting & Finance Master

Give me a chance, i will do this with my best efforts

$77 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I will cover all the points which you have mentioned in your project details.

$35 Chat With Writer
Engineering Help

ONLINE

Engineering Help

I will cover all the points which you have mentioned in your project details.

$61 Chat With Writer
24/7 Assignment Help

ONLINE

24/7 Assignment Help

I have read your project details. I can do this within your deadline.

$110 Chat With Writer
Top Writing Guru

ONLINE

Top Writing Guru

Give me a chance, i will do this with my best efforts

$55 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$19 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cipd level 3 assignment answers - Ops 571 week 6 signature assignment - Number of kcalories provided by a 16 ounce regular soda - Punnett square practice worksheet answers - Discussion 7 - What is the average amount of time couples spend together - Romeo and juliet final test - Financial management concepts and applications by stephen foerster pdf - How to get answers for homework - The generic types of competitive strategies include - 8 octants in 3d - Names of christ lds - Clark industries has a defined benefit pension plan - Aerobic respiration flow chart - Thread: Week 10 Discussion Prompt - Sample irb application completed walden university - Complete the company's cash budget for the upcoming fiscal year - Discussion 300 WORDS MINIMUM - What is a statutory merger - CRIMINAL JUSTICE - 2nd part - Single phase transformer circuit diagram - Can informatics be used to gain wisdom - Why are patients with pheochromocytoma often hyperglycemic - Assg 3 - Selection ratio and base rate - Duty of care in hospitality industry - The mazzanti wholesale food company - Condensed financial data of odgers inc follow - America in a changing world - Practical connection - WEEK 44 - Escience labs test tube rack - Human resource management lussier 3rd edition pdf - Hip pointer healing time - (Rok) Stock Journal Assignment 2 - Aditya hridaya stotra benefits - Instruments of the woodwind family - Oak farm shop balsall common - The pasta song madeline l pots lyrics - TLAS6 - Importance of user technology security education within organizations - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI - Battle of milvian bridge primary source - Used cooking oil msds - We re going on a bear hunt printable book - Ausclad group of companies - The new new play by kelly stuart - Signature Assignment: Violation of Trust Paper - Station 1 dissolved oxygen answer key - Business ethics ppt for bba - Discussion/criminal justice - Only tayp this pages - Biostatistics Discussion Response (Mod 2) - LITERATURE - Trane leed ce hours - Discussion Board 7-1A - Fitt principle ppt - Guiding principles of supervision - Suggest name for the following compound - What language technique is used in this quote - Kramer and knox began a partnership by investing - Next level surveillance china embraces facial recognition - Ana bertha espin en bikini - The content of a table header cell is ____ by default in most browsers. - Risks threats and vulnerabilities commonly found in the workstation domain - Enterprise risk management - Assignment: Identify a Problem - A matter of facts - How to write a play - Use case diagram for student registration system - How to reset hp 10bii financial calculator - Selectively reflective and inconsistently fair describe which level of thinking - Week 5 business law - Camp skits for counselors - 159.5 mm to inches - Sodium phosphate monobasic and dibasic buffer - Persuasive speech topics about dogs - Can a pmo accelerate the implementation process discussion - Nursing diagnosis for gestational diabetes mellitus care plan - Gsi commerce solutions kate spade - DISCUSSION - Baby bunting layby conditions - School nursing - Hip pointer injury recovery time - Amanda 100320 - How to measure 3 phase power - Examples of short stories with conflict and resolution - Help in Excel - Writing about movies 3rd edition pdf - Unsw canberra student administrative services - Essay - Respond to 2 Colleagues 1 paragraph each Wk7D2 - Special relativity lecture 3 - Marie spartali stillman antigone - 8 P1 - Professional capstone and practicum reflective journal and scholarly activities - Managerial Accounting - Question 2 - How to write your recovery story - The discount on bonds payable account is