BIG DATAANALYTICS
SUBMITTED BY
NAME:K.GAYADRI
CLASS:II-M.SC,COMPUTER SCIENCE
BATCH:2017-2019
INCHARGE STAFF:MS.M.FLORENCE DAYANA
The problem is that given the OSI Network Model of: Application,
Transport, Network, Datalink and Physical, where amongst this can security be
deployed? Should everything be concentrated at the data link or network or transport…
layers? or should a Defence in Depth strategy be employed? These notes details the
various ways in which networks can be made secure. The remainder of this chapter
provides some introductory material in relation to networks and their security. First,
some terminology:
• Security Attack: Any action that compromises the security of information
exchanges and systems.
• Security Service: A service that enhances the security of information
exchanges and systems. A security service makes use of one or more
security mechanisms.
• Security Mechanism*: A mechanism that is designed to detect, prevent or
recover from a security attack.
. Security Attacks
There exist several attack types and they can be divided into two distinct category’s:
Passive and Active, they denote the amount of work that an attacker must do.
2.1.1. Passive Attacks
A Passive Attack is one that involves either the eavesdropping or monitoring of data communications.
The goal of the malicious entity is to acquire the information or learn more about the communication.
Traffic Analysis:
Traffic analysis is concerned with the analysis of patterns generated by the
actions of the parties involved. This may simply involve the detection of an
encrypted message being sent from a single party.
Such attacks are difficult to detect, due to their inherent nature. Though one can use encryption in
order to inhibit the success-fullness of such attacks.
Active Attacks
Active Attacks are those that involve the modification of the communication
channel or the data being sent across the channel.
• Masquerade: This is simply the impersonation of a legitimate
entity in order to abuse or access the resources accessible
by the entity.
• Replay: Involves the retransmission of existing and already
transmitted data in order to produce an unauthorized effect.
• Message Modification: The delay, modification, reorder on a
legitimate message such that it produces an unauthorized
effect.
• Denial of Service: This involves the prevention of or
reduction in quality, of a legitimate service. Such attacks may
target specific hosts or entire networks.
In contrast to passive attacks, active ones are easy to detect but harder to
counter, as it would involve the protection of all the communication services
offered.
A Security Service, as defined by X.800, is a service provided by a protocol layer of communicating
open systems, which ensures adequate security of the systems or data transfers. There are five ctegories
mentioned, together with availability:
Availability
The property of a system or a system resource being accessible and usable upon demand by an
authorized system entity, according to performance specifications for the system.
Access Control
The prevention of unauthorized use of a resource.
Authentication
This is the assurance that the communicating entity is the one that it claims to be. There are two classes
of authentication:
Data Confidentiality
The protection of data from unauthorised disclosure. This can be
further specified as:
• Connection Confidentiality — The protection of all
user data on a connection.
• Connectionless Confidentiality — The protection
of all user data in as single data block.
• Selective-Field Confidentiality — The
confidentiality of selected fields within the user data
on a connection or in a single data block.
• Traffic-Flow Confidentiality — The protection of
the information that might be derived from
observation of traffic flows.
Data Integrity
The assurance that data received is in the exact same format as it was
when sent by an authorised entity. This can be considered in terms of
Connection Integrity:
• Connection Integrity with Recovery — Provided for
the integrity of all user data on a connection and
detects any modification, insertion, deletion or replay of
any data within an entire data sequence, with recovery
attempted.
• Connection Integrity without Recovery — As
previously but provides only detection without recovery.
• Selective-Field Connection Integrity — Provides for
the integrity of selected field within the user data of a
data block transferred over a connection and takes the
form of determination of whether the selected fields
have been modified, inserted, deleted or replayed.
Security Mechanisms
refer to tools and techniques that can be implemented within a specific
protocol layer or out with the layer that provided some form of security. Some
examples are listed below.
Specific Mechanisms
Encryption, Digital Signatures, Access Control, Data Integrity, Authentication
Exchange, Traffic Padding, Routing Control, Notarisation
Pervasive Mechanisms
Trusted Functionality, Security Label, Event Detection, Security Audit
Trail, Security Recovery
a. Design an algorithm for performing the security related transformation.
b.Generate the secret information that is to be used.
c.Develop method for distribution and sharing of the secret information.
d.Specify a protocol to be used by the two principals that utilises the security
algorithm and secret information to achieve a particular security service. 2.4.2.
Secure Systems
Secure System
The other model reflects the remainder of the security problems that are
associated with the protection of an information system i.e. a network, from
malicious entities
THANKYOU

More Related Content

PDF
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
PPTX
Network Security and Cryptography
PPTX
Information and network security 5 security attacks mechanisms and services
PDF
Introduction to Network security
PPTX
Information and network security 6 security attacks
PDF
OTechs Cloud computing security
PPTX
Information and network security 9 model for network security
PDF
Risk Analysis Report review
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
Network Security and Cryptography
Information and network security 5 security attacks mechanisms and services
Introduction to Network security
Information and network security 6 security attacks
OTechs Cloud computing security
Information and network security 9 model for network security
Risk Analysis Report review

What's hot (20)

PPT
Chapter006
PDF
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
PPTX
Smart city project's Information Security challenges
PDF
Do4301690695
PDF
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
PPTX
Web security
PDF
Evaluation the performanc of dmz
PDF
Cr32585591
PPTX
Distributed system for access control to physical resources based on qualific...
PDF
Personalized Sensing System
PDF
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
PDF
A Distributed Approach to Defend Web Service from DDoS Attacks
PDF
www.ijerd.com
PPTX
security IDS
PDF
G041124047
PDF
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
PDF
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
PDF
Transforming Expectations for Treat-Intelligence Sharing
 
Chapter006
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
Smart city project's Information Security challenges
Do4301690695
Host-based Security, by Dmitry Khlebnikov @ Secure Development Melbourne
Web security
Evaluation the performanc of dmz
Cr32585591
Distributed system for access control to physical resources based on qualific...
Personalized Sensing System
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
A Distributed Approach to Defend Web Service from DDoS Attacks
www.ijerd.com
security IDS
G041124047
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP B...
Transforming Expectations for Treat-Intelligence Sharing
 
Ad

Similar to NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE (20)

PPTX
information security unit 1 notes ppt contents
PPT
Network and Information Security unit 1.ppt
PPTX
Unit 1-NETWORK Security.pptx............
PPTX
Basics -1.pptx kiy fdest xfderwe dgdar d
PPTX
X.800 defines a security service iyew gt
PPTX
2-OSI SECURITY ARCHITECTURE F1-1.pptxhhhh
PDF
A Review on Wireless Network Security.pdf
PPTX
Unit-1.pptx
PDF
Network security chapter 1
PPTX
Network security introduction part .pptx
PDF
Cryptography and Network Security ppt . pdf
PPTX
BCA-601N_final_1-1.pptx uuggjjgghjjhhjjj
PPTX
BCA-601N_final_1-1Finalsem6metworks.pptx
PDF
Lec 01.pdf
PDF
Computer Network Security study mate.pdf
PPTX
2.Types of Attacks.pptx
PPTX
DOCX
CCS354-NETWORK SECURITY-network-security notes
information security unit 1 notes ppt contents
Network and Information Security unit 1.ppt
Unit 1-NETWORK Security.pptx............
Basics -1.pptx kiy fdest xfderwe dgdar d
X.800 defines a security service iyew gt
2-OSI SECURITY ARCHITECTURE F1-1.pptxhhhh
A Review on Wireless Network Security.pdf
Unit-1.pptx
Network security chapter 1
Network security introduction part .pptx
Cryptography and Network Security ppt . pdf
BCA-601N_final_1-1.pptx uuggjjgghjjhhjjj
BCA-601N_final_1-1Finalsem6metworks.pptx
Lec 01.pdf
Computer Network Security study mate.pdf
2.Types of Attacks.pptx
CCS354-NETWORK SECURITY-network-security notes
Ad

Recently uploaded (20)

PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
semiconductor packaging in vlsi design fab
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
English Textual Question & Ans (12th Class).pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
Empowerment Technology for Senior High School Guide
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Virtual and Augmented Reality in Current Scenario
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Introduction to pro and eukaryotes and differences.pptx
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
semiconductor packaging in vlsi design fab
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Complications of Minimal Access-Surgery.pdf
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
English Textual Question & Ans (12th Class).pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
Empowerment Technology for Senior High School Guide

NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE

  • 1. BIG DATAANALYTICS SUBMITTED BY NAME:K.GAYADRI CLASS:II-M.SC,COMPUTER SCIENCE BATCH:2017-2019 INCHARGE STAFF:MS.M.FLORENCE DAYANA
  • 2. The problem is that given the OSI Network Model of: Application, Transport, Network, Datalink and Physical, where amongst this can security be deployed? Should everything be concentrated at the data link or network or transport… layers? or should a Defence in Depth strategy be employed? These notes details the various ways in which networks can be made secure. The remainder of this chapter provides some introductory material in relation to networks and their security. First, some terminology: • Security Attack: Any action that compromises the security of information exchanges and systems. • Security Service: A service that enhances the security of information exchanges and systems. A security service makes use of one or more security mechanisms. • Security Mechanism*: A mechanism that is designed to detect, prevent or recover from a security attack.
  • 3. . Security Attacks There exist several attack types and they can be divided into two distinct category’s: Passive and Active, they denote the amount of work that an attacker must do. 2.1.1. Passive Attacks A Passive Attack is one that involves either the eavesdropping or monitoring of data communications. The goal of the malicious entity is to acquire the information or learn more about the communication. Traffic Analysis: Traffic analysis is concerned with the analysis of patterns generated by the actions of the parties involved. This may simply involve the detection of an encrypted message being sent from a single party. Such attacks are difficult to detect, due to their inherent nature. Though one can use encryption in order to inhibit the success-fullness of such attacks.
  • 4. Active Attacks Active Attacks are those that involve the modification of the communication channel or the data being sent across the channel. • Masquerade: This is simply the impersonation of a legitimate entity in order to abuse or access the resources accessible by the entity. • Replay: Involves the retransmission of existing and already transmitted data in order to produce an unauthorized effect. • Message Modification: The delay, modification, reorder on a legitimate message such that it produces an unauthorized effect. • Denial of Service: This involves the prevention of or reduction in quality, of a legitimate service. Such attacks may target specific hosts or entire networks. In contrast to passive attacks, active ones are easy to detect but harder to counter, as it would involve the protection of all the communication services offered.
  • 5. A Security Service, as defined by X.800, is a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or data transfers. There are five ctegories mentioned, together with availability: Availability The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. Access Control The prevention of unauthorized use of a resource. Authentication This is the assurance that the communicating entity is the one that it claims to be. There are two classes of authentication:
  • 6. Data Confidentiality The protection of data from unauthorised disclosure. This can be further specified as: • Connection Confidentiality — The protection of all user data on a connection. • Connectionless Confidentiality — The protection of all user data in as single data block. • Selective-Field Confidentiality — The confidentiality of selected fields within the user data on a connection or in a single data block. • Traffic-Flow Confidentiality — The protection of the information that might be derived from observation of traffic flows.
  • 7. Data Integrity The assurance that data received is in the exact same format as it was when sent by an authorised entity. This can be considered in terms of Connection Integrity: • Connection Integrity with Recovery — Provided for the integrity of all user data on a connection and detects any modification, insertion, deletion or replay of any data within an entire data sequence, with recovery attempted. • Connection Integrity without Recovery — As previously but provides only detection without recovery. • Selective-Field Connection Integrity — Provides for the integrity of selected field within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed.
  • 8. Security Mechanisms refer to tools and techniques that can be implemented within a specific protocol layer or out with the layer that provided some form of security. Some examples are listed below. Specific Mechanisms Encryption, Digital Signatures, Access Control, Data Integrity, Authentication Exchange, Traffic Padding, Routing Control, Notarisation Pervasive Mechanisms Trusted Functionality, Security Label, Event Detection, Security Audit Trail, Security Recovery
  • 9. a. Design an algorithm for performing the security related transformation. b.Generate the secret information that is to be used. c.Develop method for distribution and sharing of the secret information. d.Specify a protocol to be used by the two principals that utilises the security algorithm and secret information to achieve a particular security service. 2.4.2. Secure Systems
  • 10. Secure System The other model reflects the remainder of the security problems that are associated with the protection of an information system i.e. a network, from malicious entities