2
Most read
3
Most read
Information and Network Security:
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Threat
• In the literature, the terms threat and attack are commonly used
to mean more or less the same thing. Table 1.1 provides
definitions taken from RFC 2828, Internet Security Glossary.
• Threat - A potential for violation of security, which exists when
there is a circumstance, capability, action, or event that could
breach security and cause harm. That is, a threat is a possible
danger that might exploit a vulnerability.
Attack
• Attack - An assault on system security that derives from an
intelligent threat; that is, an intelligent act that is a deliberate
attempt (especially in the sense of a method or technique) to
evade security services and violate the security policy of a
system.
Aspects of Security
• consider 3 aspects of information security:
• security attack
• security mechanism
• security service
• note terms
• threat – a potential for violation of security
• attack – an assault on system security, a deliberate attempt to evade security
services
Security attack
• The OSI security architecture focuses on security attacks, mechanisms, and services.
These can be defined briefly as follows:
• • Security attack: Any action that compromises the security of information owned by an
organization.
• Network security attacks are unauthorized actions against private, corporate or
governmental IT assets in order to destroy them, modify them or steal sensitive data.
• As more enterprises invite employees to access data from mobile devices, networks
become vulnerable to data theft or total destruction of the data or network.
Security mechanism
• • Security mechanism: A process (or a device incorporating
such a process) that is designed to detect, prevent, or recover
from a security attack.
• • Previously, organizations would attempt to prevent network
attacks by using network security tools such as firewalls or
intrusion detection systems. While these still have their place,
they are no match for modern day security attacks,
Security mechanism
• for example modern Distributed Denial of Service (DDoS)
attacks, as these attack on a much deeper level.
• These traditional perimeter-based solutions rely on a “castle
and moat” method whereby anybody who manages to penetrate
the network is automatically trusted, rather than authenticated
before entering. These may introduce new threats due to
improper configuration is sub-standard patching.
Security mechanism
• Enterprises may also carry out vulnerability management and
penetration testing. These help to meet compliance
requirements and help to address gaps in information security,
but they are very resource consuming. For a fully scalable,
multi-layered defense solution, companies should invest in
cloud security solutions.
Security service
• Security service: A processing or communication service that
enhances the security of the data processing systems and the
information transfers of an organization. The services are
intended to counter security attacks, and they make use of one
or more security mechanisms to provide the service.
Assignment
• Explain the 3 aspects of information security security attack, security
mechanism and security service

More Related Content

PPTX
Information and network security 7 security services
PPTX
Information and network security 6 security attacks
PPTX
Information and network security 4 osi architecture
PPTX
Information and network security 2 nist security definition
PPTX
Information and network security 3 security challenges
PPTX
Information and network security 9 model for network security
PPTX
Information and network security 1 introduction
PPTX
Information and network security 47 authentication applications
Information and network security 7 security services
Information and network security 6 security attacks
Information and network security 4 osi architecture
Information and network security 2 nist security definition
Information and network security 3 security challenges
Information and network security 9 model for network security
Information and network security 1 introduction
Information and network security 47 authentication applications

What's hot (20)

PPTX
Smart city project's Information Security challenges
PDF
Introduction to Network security
PPTX
Chapter- I introduction
PPTX
Ppt.1
PDF
BAIT1103 Course Overview
PDF
Chapter-I introduction
PPTX
Types of attacks
PPT
cryptographic security
PPTX
Cryptographic Security
PPTX
Network Security Goals
PPTX
Cia security model
PPTX
PPT
Technical seminar on Security
PPTX
Security
PPTX
Chapter 1: Overview of Network Security
PPTX
Security Mechanisms
PDF
Network security chapter 1
PPTX
Network security
Smart city project's Information Security challenges
Introduction to Network security
Chapter- I introduction
Ppt.1
BAIT1103 Course Overview
Chapter-I introduction
Types of attacks
cryptographic security
Cryptographic Security
Network Security Goals
Cia security model
Technical seminar on Security
Security
Chapter 1: Overview of Network Security
Security Mechanisms
Network security chapter 1
Network security
Ad

Similar to Information and network security 5 security attacks mechanisms and services (20)

PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
information security (network security methods)
PPTX
Information security ist lecture
PPTX
sec.This includes policy settings that prevent unauthorized people
PPTX
Cyber-Security-Unit-1.pptx
PDF
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
PPTX
Unit 1.pptx
DOCX
Seguridad web -articulo completo- ingles
PDF
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
PPT
PPT
computer security .ppt
PPT
Network and Information Security unit 1.ppt
PPT
Module-1.ppt cryptography and network security
PPTX
Ethical Hacking and Network Defence 1.pptx
PPT
1 network securityIntroduction - MSC.ppt
PPTX
Lec 1- Intro to cyber security and recommendations
PPT
ch01.ppt
PPTX
PPT0-Computer Security Concepts.pptx
PDF
BAIT1103 Chapter 1
PPT
Nw sec
Unit 1 Network Fundamentals and Security .pptx
information security (network security methods)
Information security ist lecture
sec.This includes policy settings that prevent unauthorized people
Cyber-Security-Unit-1.pptx
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
Unit 1.pptx
Seguridad web -articulo completo- ingles
UNIT- I & II_ 3R-Cryptography-Lectures_2021-22_VSM.pdf
computer security .ppt
Network and Information Security unit 1.ppt
Module-1.ppt cryptography and network security
Ethical Hacking and Network Defence 1.pptx
1 network securityIntroduction - MSC.ppt
Lec 1- Intro to cyber security and recommendations
ch01.ppt
PPT0-Computer Security Concepts.pptx
BAIT1103 Chapter 1
Nw sec
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues

Recently uploaded (20)

PDF
Topaz Photo AI Crack New Download (Latest 2025)
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
Python is a high-level, interpreted programming language
PDF
Visual explanation of Dijkstra's Algorithm using Python
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PDF
E-Commerce Website Development Companyin india
PPTX
Introduction to Windows Operating System
PPTX
Cybersecurity: Protecting the Digital World
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PPTX
Download Adobe Photoshop Crack 2025 Free
PPTX
most interesting chapter in the world ppt
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Topaz Photo AI Crack New Download (Latest 2025)
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Python is a high-level, interpreted programming language
Visual explanation of Dijkstra's Algorithm using Python
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
E-Commerce Website Development Companyin india
Introduction to Windows Operating System
Cybersecurity: Protecting the Digital World
BoxLang Dynamic AWS Lambda - Japan Edition
Tech Workshop Escape Room Tech Workshop
Practical Indispensable Project Management Tips for Delivering Successful Exp...
Download Adobe Photoshop Crack 2025 Free
most interesting chapter in the world ppt
Full-Stack Developer Courses That Actually Land You Jobs
MCP Security Tutorial - Beginner to Advanced
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
novaPDF Pro 11.9.482 Crack + License Key [Latest 2025]
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025

Information and network security 5 security attacks mechanisms and services

  • 1. Information and Network Security: Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Threat • In the literature, the terms threat and attack are commonly used to mean more or less the same thing. Table 1.1 provides definitions taken from RFC 2828, Internet Security Glossary. • Threat - A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.
  • 3. Attack • Attack - An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.
  • 4. Aspects of Security • consider 3 aspects of information security: • security attack • security mechanism • security service • note terms • threat – a potential for violation of security • attack – an assault on system security, a deliberate attempt to evade security services
  • 5. Security attack • The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: • • Security attack: Any action that compromises the security of information owned by an organization. • Network security attacks are unauthorized actions against private, corporate or governmental IT assets in order to destroy them, modify them or steal sensitive data. • As more enterprises invite employees to access data from mobile devices, networks become vulnerable to data theft or total destruction of the data or network.
  • 6. Security mechanism • • Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. • • Previously, organizations would attempt to prevent network attacks by using network security tools such as firewalls or intrusion detection systems. While these still have their place, they are no match for modern day security attacks,
  • 7. Security mechanism • for example modern Distributed Denial of Service (DDoS) attacks, as these attack on a much deeper level. • These traditional perimeter-based solutions rely on a “castle and moat” method whereby anybody who manages to penetrate the network is automatically trusted, rather than authenticated before entering. These may introduce new threats due to improper configuration is sub-standard patching.
  • 8. Security mechanism • Enterprises may also carry out vulnerability management and penetration testing. These help to meet compliance requirements and help to address gaps in information security, but they are very resource consuming. For a fully scalable, multi-layered defense solution, companies should invest in cloud security solutions.
  • 9. Security service • Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
  • 10. Assignment • Explain the 3 aspects of information security security attack, security mechanism and security service