3
Most read
7
Most read
Information and Network Security: 4
OSI Security Architecture
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
OSI Security Architecture
• ITU-T X.800 “Security Architecture for OSI”
• defines a systematic way of defining and providing
security requirements
• for us it provides a useful, if abstract, overview of
concepts we will study
OSI Security Architecture
• To assess effectively the security needs of an organization and
to evaluate and choose various security products and policies,
the manager responsible for security needs some systematic
way of defining the requirements for security and characterizing
the approaches to satisfying those requirements. This is difficult
enough in a centralized data processing environment; with the
use of local and wide area networks the problems are
compounded. ITU-T Recommendation X.800, Security
Architecture for OSI, defines such a systematic approach. The
OSI security architecture is useful to managers as a way of
organizing the task of providing security.
Levels of Impact
 We can define three levels of impact on organizations or individuals should there
be a breach of security (i.e., a loss of confidentiality, integrity, or availability).
These levels are defined in FIPS PUB 199:
 3 levels of impact from a security breach
 Low
 Moderate
 High
Levels of Impact
• • Low: The loss could be expected to have a limited adverse effect on organizational
operations, organizational assets, or individuals. A limited adverse effect means that, for
example, the loss of confidentiality, integrity, or availability might
• (i) cause a degradation in mission capability to an extent and duration that the
organization is able to perform its primary functions, but the effectiveness of the
functions is noticeably reduced;
• (ii) result in minor damage to organizational assets;
• (iii) result in minor financial loss; or
• (iv) result in minor harm to individuals.
Levels of Impact
• • Moderate: The loss could be expected to have a serious adverse effect on organizational
operations, organizational assets, or individuals. A serious adverse effect means that, for
example, the loss might
• (i) cause a significant degradation in mission capability to an extent and duration that
the organization is able to perform its primary functions, but the effectiveness of the
functions is significantly reduced;
• (ii) result in significant damage to organizational assets;
• (iii) result in significant financial loss; or
• (iv) result in significant harm to individuals that does not involve loss of life or serious,
life-threatening injuries.
Levels of Impact
• • High: The loss could be expected to have a severe or
catastrophic adverse effect on organizational operations,
organizational assets, or individuals. A severe or
catastrophic adverse effect means that, for example, the
loss might
• (i) cause a severe degradation in or loss of mission capability to an extent and
duration that the organization is not able to perform one or more of its primary
functions;
• (ii) result in major damage to organizational assets;
• (iii) result in major financial loss; or
• (iv) result in severe or catastrophic harm to individuals involving loss of life or
serious life threatening injuries.
Examples of Security Requirements
• confidentiality – student grades
• integrity – patient information
• availability – authentication service
Examples of Security Requirements
• We now provide some examples of applications that illustrate the requirements just enumerated.
• • Confidentiality - Student grade information is an asset whose confidentiality is considered to be
highly important by students. Grade information should only be available to students, their parents,
and employees that require the information to do their job.
• Student enrollment information may have a moderate confidentiality rating. While still coveredby
FERPA, this information is seen by more people on a daily basis, is less likely to be targeted than
grade information, and results in less damage if disclosed.
• Directory information, such as lists of students or faculty or departmental lists, may be assigned a
low confidentiality rating or indeed no rating. This information is typically freely available to the
public and published on a school's Web site.
Examples of Security Requirements
• • Integrity – Consider a hospital patient's allergy information stored in a database. The doctor should
be able to trust that the information is correct and current.
• Now suppose that an employee (e.g., a nurse) who is authorized to view and update this
information deliberately falsifies the data to cause harm to the hospital.
• The database needs to be restored to a trusted basis quickly, and it should be possible to trace the
error back to the person responsible.
• Patient allergy information is an example of an asset with a high requirement for integrity.
• Inaccurate information could result in serious harm or death to a patient and expose the hospital to
massive liability.
Examples of Security Requirements
• • Availability - The more critical a component or service, the higher is the level of
availability required.
• Consider a system that provides authentication services for critical systems,
applications, and devices.
• An interruption of service results in the inability for customers to access
computing resources and staff to access the resources they need to perform
critical tasks.
• The loss of the service translates into a large financial loss in lost employee
productivity and potential customer loss.
• Discuss levels of impact from a security breach
• Explain using an example the confidentiality integrity and availability
concepts in information security

More Related Content

PPTX
Information and network security 5 security attacks mechanisms and services
PPTX
Information and network security 7 security services
PPTX
Information and network security 6 security attacks
PPTX
Information and network security 2 nist security definition
PPTX
Information and network security 3 security challenges
PPTX
Information and network security 9 model for network security
PPTX
Information and network security 1 introduction
PPTX
Smart city project's Information Security challenges
Information and network security 5 security attacks mechanisms and services
Information and network security 7 security services
Information and network security 6 security attacks
Information and network security 2 nist security definition
Information and network security 3 security challenges
Information and network security 9 model for network security
Information and network security 1 introduction
Smart city project's Information Security challenges

What's hot (20)

PPTX
Information and network security 47 authentication applications
PPTX
Chapter- I introduction
PPTX
Ppt.1
PDF
Introduction to Network security
PDF
BAIT1103 Course Overview
PDF
Chapter-I introduction
PPTX
Cryptographic Security
PPT
cryptographic security
PPTX
Network Security Goals
PPTX
Cia security model
PPTX
Network security
PPTX
Introduction to Network Security
PDF
BAIT1103 Chapter 1
PPT
Technical seminar on Security
PPTX
Introduction to Information Security
PPTX
Cyber Security # Lec 3
PPT
Introduction to information security
Information and network security 47 authentication applications
Chapter- I introduction
Ppt.1
Introduction to Network security
BAIT1103 Course Overview
Chapter-I introduction
Cryptographic Security
cryptographic security
Network Security Goals
Cia security model
Network security
Introduction to Network Security
BAIT1103 Chapter 1
Technical seminar on Security
Introduction to Information Security
Cyber Security # Lec 3
Introduction to information security
Ad

Similar to Information and network security 4 osi architecture (20)

PDF
Information Security in term of computer science
PPT
M.Florence Dayana/Cryptography and Network security
PPT
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
PPT
ch01_overview_nemo.ppt
PPT
ch01_overview_nemo.ppt
PPT
Ch01 overview nemo
PPT
ch01_overview.ppt
PPT
ch01_overview.ppt
PPTX
Information security: importance of having defined policy & process
PPT
ch01_overview_bywillialmstallings_nemo.ppt
PPT
ch01_overview_nemo cryptography concepts.ppt
PPTX
Security & Risk Mgmt_WK1.pptx
PPTX
Security & Risk Mgmt_WK1.pptx
PPTX
Introduction to Computer Security
PDF
Network Security introduction.pdf
PPT
ch01_nemo-Pendahuluan.ppt
PPTX
CCS TOPIC 1.pptx
PPT
Testing
Information Security in term of computer science
M.Florence Dayana/Cryptography and Network security
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
ch01_overview_nemo.ppt
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo.ppt
ch01_overview_nemo.ppt
Ch01 overview nemo
ch01_overview.ppt
ch01_overview.ppt
Information security: importance of having defined policy & process
ch01_overview_bywillialmstallings_nemo.ppt
ch01_overview_nemo cryptography concepts.ppt
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
Introduction to Computer Security
Network Security introduction.pdf
ch01_nemo-Pendahuluan.ppt
CCS TOPIC 1.pptx
Testing
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues

Recently uploaded (20)

DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
Visual explanation of Dijkstra's Algorithm using Python
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
PDF
Microsoft Office 365 Crack Download Free
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
Introduction to Windows Operating System
PPTX
CNN LeNet5 Architecture: Neural Networks
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PDF
AI-Powered Fuzz Testing: The Future of QA
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PPTX
Computer Software - Technology and Livelihood Education
PPTX
Lecture 5 Software Requirement Engineering
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PPTX
Cybersecurity: Protecting the Digital World
PPTX
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Visual explanation of Dijkstra's Algorithm using Python
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
Microsoft Office 365 Crack Download Free
Internet Download Manager IDM Crack powerful download accelerator New Version...
CCleaner 6.39.11548 Crack 2025 License Key
Introduction to Windows Operating System
CNN LeNet5 Architecture: Neural Networks
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
AI-Powered Fuzz Testing: The Future of QA
Wondershare Recoverit Full Crack New Version (Latest 2025)
Full-Stack Developer Courses That Actually Land You Jobs
Computer Software - Technology and Livelihood Education
Lecture 5 Software Requirement Engineering
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
Cybersecurity: Protecting the Digital World
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
Practical Indispensable Project Management Tips for Delivering Successful Exp...
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...

Information and network security 4 osi architecture

  • 1. Information and Network Security: 4 OSI Security Architecture Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. OSI Security Architecture • ITU-T X.800 “Security Architecture for OSI” • defines a systematic way of defining and providing security requirements • for us it provides a useful, if abstract, overview of concepts we will study
  • 3. OSI Security Architecture • To assess effectively the security needs of an organization and to evaluate and choose various security products and policies, the manager responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local and wide area networks the problems are compounded. ITU-T Recommendation X.800, Security Architecture for OSI, defines such a systematic approach. The OSI security architecture is useful to managers as a way of organizing the task of providing security.
  • 4. Levels of Impact  We can define three levels of impact on organizations or individuals should there be a breach of security (i.e., a loss of confidentiality, integrity, or availability). These levels are defined in FIPS PUB 199:  3 levels of impact from a security breach  Low  Moderate  High
  • 5. Levels of Impact • • Low: The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. A limited adverse effect means that, for example, the loss of confidentiality, integrity, or availability might • (i) cause a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced; • (ii) result in minor damage to organizational assets; • (iii) result in minor financial loss; or • (iv) result in minor harm to individuals.
  • 6. Levels of Impact • • Moderate: The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. A serious adverse effect means that, for example, the loss might • (i) cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced; • (ii) result in significant damage to organizational assets; • (iii) result in significant financial loss; or • (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.
  • 7. Levels of Impact • • High: The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A severe or catastrophic adverse effect means that, for example, the loss might • (i) cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions; • (ii) result in major damage to organizational assets; • (iii) result in major financial loss; or • (iv) result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries.
  • 8. Examples of Security Requirements • confidentiality – student grades • integrity – patient information • availability – authentication service
  • 9. Examples of Security Requirements • We now provide some examples of applications that illustrate the requirements just enumerated. • • Confidentiality - Student grade information is an asset whose confidentiality is considered to be highly important by students. Grade information should only be available to students, their parents, and employees that require the information to do their job. • Student enrollment information may have a moderate confidentiality rating. While still coveredby FERPA, this information is seen by more people on a daily basis, is less likely to be targeted than grade information, and results in less damage if disclosed. • Directory information, such as lists of students or faculty or departmental lists, may be assigned a low confidentiality rating or indeed no rating. This information is typically freely available to the public and published on a school's Web site.
  • 10. Examples of Security Requirements • • Integrity – Consider a hospital patient's allergy information stored in a database. The doctor should be able to trust that the information is correct and current. • Now suppose that an employee (e.g., a nurse) who is authorized to view and update this information deliberately falsifies the data to cause harm to the hospital. • The database needs to be restored to a trusted basis quickly, and it should be possible to trace the error back to the person responsible. • Patient allergy information is an example of an asset with a high requirement for integrity. • Inaccurate information could result in serious harm or death to a patient and expose the hospital to massive liability.
  • 11. Examples of Security Requirements • • Availability - The more critical a component or service, the higher is the level of availability required. • Consider a system that provides authentication services for critical systems, applications, and devices. • An interruption of service results in the inability for customers to access computing resources and staff to access the resources they need to perform critical tasks. • The loss of the service translates into a large financial loss in lost employee productivity and potential customer loss.
  • 12. • Discuss levels of impact from a security breach • Explain using an example the confidentiality integrity and availability concepts in information security