SlideShare a Scribd company logo
5
Most read
6
Most read
8
Most read
EUSL/TC/IS/2014/COM/02
EUSL/TC/IS/2014/COM/05
EUSL/TC/IS/2014/COM/06
EUSL/TC/IS/2014/COM/14
Contents
1. About Security services
2. Authentication
3. Access Control
4. Data Confidentiality
5. Data Integrity
6. Nonrepudiation
12/7/2018 Security Services 2
Security Services
• The OSI Security Architecture is a framework that provides a systematic
way of defining the requirements for security and characterizing the
approaches to satisfying those requirements. The document
defines security attacks, mechanisms, and services, and the relationships
among these categories.
• X.800 defines a security service as a service provided by a protocol layer of
communicating open systems, which ensures adequate security of the
systems or of data transfers.
12/7/2018 Security Services 3
Cont…
•
• A processing or communication service that is provided by a
system to give a specific kind of protection to system
resources.
• Security services implement security policies and are
implemented by security mechanisms.
12/7/2018 Security Services 4
AUTHENTICATION
• The authentication service is concerned
with assuring that a communication is
authentic. In the case of a single
message, such as a warning or alarm
signal, the function of the
authentication service is to assure the
recipient that the message is from the
source that it claims to be from.
12/7/2018 Security Services 5
ACCESS CONTROL
• In the context of network security, access
control is the ability to limit and control
the access to host systems and
applications via communications links. To
achieve this, each entity trying to gain
access must first be identified, or
authenticated, so that access rights can
be tailored to the individual.
12/7/2018 Security Services 6
DATA CONFIDENTIALITY
• Confidentiality is the protection of
transmitted data from passive attacks.
With respect to the content of a data
transmission, several levels of protection
can be identified. The broadest service
protects all user data transmitted
between two users over a period of
time.
12/7/2018 Security Services 7
Cont…
• The other aspect of confidentiality is
the protection of traffic flow from
analysis. This requires that an
attacker not be able to observe the
source and destination, frequency,
length, or other characteristics of the
traffic on a communications facility.
12/7/2018 Security Services 8
DATA INTEGRITY
• As with confidentiality, integrity can
apply to a stream of messages, a
single message, or selected fields
within a message. Again, the most
useful and straightforward approach
is total stream protection.
12/7/2018 Security Services 9
NONREPUDIATION
• Nonrepudiation prevents either sender
or receiver from denying a transmitted
message. Thus, when a message is sent,
the receiver can prove that the alleged
sender in fact sent the message.
Similarly, when a message is received,
the sender can prove that the alleged
receiver in fact received the message.
12/7/2018 Security Services 10
REFERENCE
• Cryptography and Network Security
Principles and Practices, Fourth
Edition - By William Stallings
12/7/2018 Security Services 11
THANK YOU…

More Related Content

PPTX
Modular arithmetic
Janani S
 
PPT
Intrusion detection system ppt
Sheetal Verma
 
PDF
Introduction to Parallel Computing
Akhila Prabhakaran
 
PPT
Email security
Indrajit Sreemany
 
PPTX
ABSTRACT ALGEBRA
MANJULAKAMALANATHAN
 
PPT
networking
Pooja Dhiman
 
PPTX
Binary to grey code conversion
Sunny
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
Modular arithmetic
Janani S
 
Intrusion detection system ppt
Sheetal Verma
 
Introduction to Parallel Computing
Akhila Prabhakaran
 
Email security
Indrajit Sreemany
 
ABSTRACT ALGEBRA
MANJULAKAMALANATHAN
 
networking
Pooja Dhiman
 
Binary to grey code conversion
Sunny
 
AES-Advanced Encryption Standard
Prince Rachit
 

What's hot (20)

PPTX
Osi model
Priyanka Sharma
 
PPTX
OSI Security Architecture
university of education,Lahore
 
PDF
Web Security
Dr.Florence Dayana
 
PPTX
Security Mechanisms
priya_trehan
 
PPTX
Network security
quest university nawabshah
 
PPTX
MAC-Message Authentication Codes
DarshanPatil82
 
PPTX
Security services and mechanisms
Rajapriya82
 
PDF
Cs8792 cns - unit iv
ArthyR3
 
PPTX
Network security model.pptx
ssuserd24233
 
PPTX
User datagram protocol (udp)
Ramola Dhande
 
PPTX
Active and Passive Network Attacks
Pradipta Poudel
 
PPT
Email Security : PGP & SMIME
Rohit Soni
 
PPTX
Key management and distribution
Riya Choudhary
 
PPTX
Hash Function
ssuserdfb2da
 
PDF
IP Security
Ambo University
 
PPTX
Transport layer
Mukesh Chinta
 
PPT
Message authentication
CAS
 
PPTX
Confusion and Diffusion.pptx
bcanawakadalcollege
 
PPTX
Types of attacks
Vivek Gandhi
 
Osi model
Priyanka Sharma
 
OSI Security Architecture
university of education,Lahore
 
Web Security
Dr.Florence Dayana
 
Security Mechanisms
priya_trehan
 
Network security
quest university nawabshah
 
MAC-Message Authentication Codes
DarshanPatil82
 
Security services and mechanisms
Rajapriya82
 
Cs8792 cns - unit iv
ArthyR3
 
Network security model.pptx
ssuserd24233
 
User datagram protocol (udp)
Ramola Dhande
 
Active and Passive Network Attacks
Pradipta Poudel
 
Email Security : PGP & SMIME
Rohit Soni
 
Key management and distribution
Riya Choudhary
 
Hash Function
ssuserdfb2da
 
IP Security
Ambo University
 
Transport layer
Mukesh Chinta
 
Message authentication
CAS
 
Confusion and Diffusion.pptx
bcanawakadalcollege
 
Types of attacks
Vivek Gandhi
 
Ad

Similar to Security services (20)

PPTX
Basics -1.pptx kiy fdest xfderwe dgdar d
SoundaryaBC2
 
PPTX
X.800 defines a security service iyew gt
SoundaryaBC2
 
PPTX
information security unit 1 notes ppt contents
Krishna681298
 
PPTX
BCA-601N_final_1-1.pptx uuggjjgghjjhhjjj
survhiagrawal
 
PPTX
BCA-601N_final_1-1Finalsem6metworks.pptx
PareshLimbad1
 
PDF
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
PDF
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
 
PPTX
CNS Module 1 in cryptography and network security
bodamaddy
 
PPTX
Unit 1-NETWORK Security.pptx............
r47381047
 
DOCX
CCS354-NETWORK SECURITY-network-security notes
Kirubaburi R
 
PPTX
Unit-1.pptx
ssuseref9c81
 
PDF
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
PDF
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
karthikasivakumar3
 
PDF
Cryptography and Network Security ppt . pdf
22cc005
 
PPT
Module-1.ppt cryptography and network security
AparnaSunil24
 
PPTX
Introduction of network security
sneha padhiar
 
PDF
Network security chapter 1
osama elfar
 
PPTX
Computer Security Essentials.pptx
Guna Dhondwad
 
PPTX
I MSc CS CNS Day 1.pptx
Arumugam90
 
Basics -1.pptx kiy fdest xfderwe dgdar d
SoundaryaBC2
 
X.800 defines a security service iyew gt
SoundaryaBC2
 
information security unit 1 notes ppt contents
Krishna681298
 
BCA-601N_final_1-1.pptx uuggjjgghjjhhjjj
survhiagrawal
 
BCA-601N_final_1-1Finalsem6metworks.pptx
PareshLimbad1
 
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
 
CNS Module 1 in cryptography and network security
bodamaddy
 
Unit 1-NETWORK Security.pptx............
r47381047
 
CCS354-NETWORK SECURITY-network-security notes
Kirubaburi R
 
Unit-1.pptx
ssuseref9c81
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
karthikasivakumar3
 
Cryptography and Network Security ppt . pdf
22cc005
 
Module-1.ppt cryptography and network security
AparnaSunil24
 
Introduction of network security
sneha padhiar
 
Network security chapter 1
osama elfar
 
Computer Security Essentials.pptx
Guna Dhondwad
 
I MSc CS CNS Day 1.pptx
Arumugam90
 
Ad

Recently uploaded (20)

PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Basics and rules of probability with real-life uses
ravatkaran694
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 

Security services

  • 2. Contents 1. About Security services 2. Authentication 3. Access Control 4. Data Confidentiality 5. Data Integrity 6. Nonrepudiation 12/7/2018 Security Services 2
  • 3. Security Services • The OSI Security Architecture is a framework that provides a systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. The document defines security attacks, mechanisms, and services, and the relationships among these categories. • X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. 12/7/2018 Security Services 3
  • 4. Cont… • • A processing or communication service that is provided by a system to give a specific kind of protection to system resources. • Security services implement security policies and are implemented by security mechanisms. 12/7/2018 Security Services 4
  • 5. AUTHENTICATION • The authentication service is concerned with assuring that a communication is authentic. In the case of a single message, such as a warning or alarm signal, the function of the authentication service is to assure the recipient that the message is from the source that it claims to be from. 12/7/2018 Security Services 5
  • 6. ACCESS CONTROL • In the context of network security, access control is the ability to limit and control the access to host systems and applications via communications links. To achieve this, each entity trying to gain access must first be identified, or authenticated, so that access rights can be tailored to the individual. 12/7/2018 Security Services 6
  • 7. DATA CONFIDENTIALITY • Confidentiality is the protection of transmitted data from passive attacks. With respect to the content of a data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period of time. 12/7/2018 Security Services 7
  • 8. Cont… • The other aspect of confidentiality is the protection of traffic flow from analysis. This requires that an attacker not be able to observe the source and destination, frequency, length, or other characteristics of the traffic on a communications facility. 12/7/2018 Security Services 8
  • 9. DATA INTEGRITY • As with confidentiality, integrity can apply to a stream of messages, a single message, or selected fields within a message. Again, the most useful and straightforward approach is total stream protection. 12/7/2018 Security Services 9
  • 10. NONREPUDIATION • Nonrepudiation prevents either sender or receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender in fact sent the message. Similarly, when a message is received, the sender can prove that the alleged receiver in fact received the message. 12/7/2018 Security Services 10
  • 11. REFERENCE • Cryptography and Network Security Principles and Practices, Fourth Edition - By William Stallings 12/7/2018 Security Services 11

Editor's Notes

  • #4: Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
  • #5:  ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU); it coordinates standards for telecommunications.
  • #6: sender, receiver want to confirm identity of each other . It confirms to the receiver that the data received has been sent only by an identified and verified sender.
  • #7: access control which is to prevent any unauthorized use of resources or limits the access to authorized users. (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do).
  • #8: It is a security service that keeps the information from an unauthorized person. • Passive Attack : Attempts to learn or make use of info from the system, but no affect on system resources ISP provide the security
  • #10: The assurance that data received are exactly as sent by an authorized entity and it grantees that a massage is received as sent. (i.e., contain no modification, insertion, deletion, or replay).
  • #11: Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication.