1 / 17

The OSI Security Architecture

The OSI Security Architecture. Network Security. The OSI Security Architecture. Objectives of the Topic After completing this topic, a student will be able to d escribe the OSI security architecture and its usefulness. The OSI Security Architecture.

Download Presentation

The OSI Security Architecture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The OSI Security Architecture Network Security

  2. The OSI Security Architecture Objectives of the Topic • After completing this topic, a student will be able to • describe the OSI security architecture and its usefulness.

  3. The OSI Security Architecture Figures and material in this topic have been • adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

  4. The OSI Security Architecture • In an organization, the manager responsible for security has to effectively assess the security needs of an organization. • He has to evaluate and choose various security products and policies.

  5. The OSI Security Architecture • Thus, the manager needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements.

  6. The OSI Security Architecture • This is difficult enough in a centralized data processing environment. • With the use of local and wide area networks, the problems are compounded.

  7. The OSI Security Architecture • Such a systematic approach was defined by the International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T).

  8. The OSI Security Architecture • (ITU-T) is a United Nations sponsored agency that develops standards, called Recommendations, relating to telecommunications and to open systems interconnection (OSI).

  9. The OSI Security Architecture • Recommendation X.800, Security Architecture for OSI. • The open systems interconnection (OSI) security architecture was developed in the context of the OSI protocol architecture.

  10. The OSI Security Architecture OSI protocol architecture

  11. The OSI Security Architecture • The OSI security architecture is useful to managers as a way of organizing the task of providing security. • It focuses on security attacks, mechanisms, and services. • These are defined next:

  12. The OSI Security Architecture Security Attack: • Any action that compromises the security of information owned by an organization.

  13. The OSI Security Architecture Security Mechanism: • A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

  14. The OSI Security Architecture Security Service: • A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.

  15. The OSI Security Architecture • The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

  16. The OSI Security Architecture RFC 4949, Internet Security Glossary.

  17. The OSI Security Architecture • The OSI architecture is an international standard, computer and communications vendors have developed security features for their products and services that relate to this structured definition of services and mechanisms. End

More Related