SlideShare a Scribd company logo
2
Most read
3
Most read
10
Most read
Information and Network Security: 8
Security Mechanisms
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Security Mechanism
• feature designed to detect, prevent, or recover from a security attack
• no single mechanism that will support all services required
• however one particular element underlies many of the security
mechanisms in use:
• cryptographic techniques
• hence our focus on this topic
• “Security Mechanism” are the specific means of implementing one or
more security services. Note these mechanisms span a wide range of
technical components, but one aspect seen in many is the use of
cryptographic techniques.
Security Mechanisms (X.800)
•specific security mechanisms:
• encipherment, digital signatures, access controls, data integrity,
authentication exchange, traffic padding, routing control, notarization
•pervasive security mechanisms:
• trusted functionality, security labels, event detection, security audit trails,
security recovery
Security Mechanisms (X.800)
• Some examples of mechanisms from X.800. Note that the “specific
security mechanisms” are protocol layer specific, whilst the “pervasive
security mechanisms” are not.
• We will meet some of these mechanisms in much greater detail later.
Specific security mechanisms
• SPECIFIC SECURITY MECHANISMS
• May be incorporated into the appropriate protocol layer in order to provide
some of the OSI security services.
• Encipherment
• The use of mathematical algorithms to transform data into a form that is
not readily intelligible.The transformation and subsequent recovery of the
data depend on an algorithm and zero or more encryption keys.
Specific security mechanisms
• Digital Signature
• Data appended to, or a cryptographic transformation of, a data unit that allows a
recipient of the data unit to prove the source and integrity of the data unit and
protect against forgery (e.g., by the recipient).
• Access Control
• A variety of mechanisms that enforce access rights to resources.
• Data Integrity
• A variety of mechanisms used to assure the integrity of a data unit or stream of
data units.
Specific security mechanisms
• Authentication Exchange A mechanism intended to ensure the identity of an entity by
means of information exchange.
• Traffic Padding The insertion of bits into gaps in a data stream to frustrate traffic analysis
attempts.
• Routing Control Enables selection of particular physically secure routes for certain data
and allows routing changes, especially when a breach of security is suspected.
• Notarization The use of a trusted third party to assure certain properties of a data
exchange.
Pervasive security mechanisms
• PERVASIVE SECURITY MECHANISMS
• Mechanisms that are not specific to any particular OSI security service or
protocol layer.
• Trusted Functionality That which is perceived to be correct with respect
to some criteria (e.g., as established by a security policy).
• Security Label The marking bound to a resource (which may be a data
unit) that names or designates the security attributes of that resource.
Pervasive security mechanisms
• Event Detection Detection of security-relevant events.
• Security Audit Trail Data collected and potentially used to
facilitate a security audit, which is an independent review and
examination of system records and activities.
• Security Recovery Deals with requests from mechanisms,
such as event handling and management functions, and takes
recovery actions.
Assignment
• What do you understand by security mechanism
• Explain Specific security mechanisms
• Explain Pervasive security mechanisms

More Related Content

PPTX
IP Security
PDF
IP Security
PPTX
Intrusion detection
 
PDF
Network security & cryptography full notes
PPT
Naming in Distributed Systems
PPTX
Io t system management with
PPTX
Classical Encryption Techniques
IP Security
IP Security
Intrusion detection
 
Network security & cryptography full notes
Naming in Distributed Systems
Io t system management with
Classical Encryption Techniques

What's hot (20)

PPTX
Cryptography and Information Security
PPT
Firewall & its configurations
PPTX
IOT Platform Design Methodology
PPTX
Security Mechanisms
PDF
Cryptography and Network Lecture Notes
PPT
Communications is distributed systems
PPTX
Point to-point protocol (ppp)
PDF
Web Security
PPTX
PPTX
Security services and mechanisms
PPTX
Recognition-of-tokens
PPTX
Security in distributed systems
PPTX
Symmetric and asymmetric key
PPT
13. Query Processing in DBMS
PPTX
Transposition Cipher
PPTX
Virtual machine security
PPT
key distribution in network security
PPTX
The CIA triad.pptx
PPTX
Computer security concepts
PPTX
Cryptography
Cryptography and Information Security
Firewall & its configurations
IOT Platform Design Methodology
Security Mechanisms
Cryptography and Network Lecture Notes
Communications is distributed systems
Point to-point protocol (ppp)
Web Security
Security services and mechanisms
Recognition-of-tokens
Security in distributed systems
Symmetric and asymmetric key
13. Query Processing in DBMS
Transposition Cipher
Virtual machine security
key distribution in network security
The CIA triad.pptx
Computer security concepts
Cryptography
Ad

Similar to Information and network security 8 security mechanisms (20)

PPT
ch01.ppt University of Education Lahore D
PPTX
2-OSI SECURITY ARCHITECTURE F1.pptxfdddss
PPTX
Lecture-8. I know this slide is littlepptx
PPTX
Lecture- program are executed in syst9.pptx
PPTX
2-OSI SECURITY ARCHITECTURE F1-1.pptxhhhh
PDF
ch01.pdf
PPTX
Network security introduction part .pptx
PPT
Networking
PPT
PDF
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
PPT
PPT
Network Security 1st Lecture
PPT
ch01.ppt
PDF
Introduction to Network security
PPTX
CS8792 - Cryptography and Network Security
PDF
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
PPT
003 Security Mechanisms and other relevant
PPT
003 Security Mechanisms and other things with
PPTX
osi-security-architectureppt.pptx
ch01.ppt University of Education Lahore D
2-OSI SECURITY ARCHITECTURE F1.pptxfdddss
Lecture-8. I know this slide is littlepptx
Lecture- program are executed in syst9.pptx
2-OSI SECURITY ARCHITECTURE F1-1.pptxhhhh
ch01.pdf
Network security introduction part .pptx
Networking
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
Network Security 1st Lecture
ch01.ppt
Introduction to Network security
CS8792 - Cryptography and Network Security
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
003 Security Mechanisms and other relevant
003 Security Mechanisms and other things with
osi-security-architectureppt.pptx
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des

Recently uploaded (20)

PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
medical staffing services at VALiNTRY
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Transform Your Business with a Software ERP System
PDF
Nekopoi APK 2025 free lastest update
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
assetexplorer- product-overview - presentation
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
AutoCAD Professional Crack 2025 With License Key
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Design an Analysis of Algorithms II-SECS-1021-03
medical staffing services at VALiNTRY
Reimagine Home Health with the Power of Agentic AI​
Transform Your Business with a Software ERP System
Nekopoi APK 2025 free lastest update
Salesforce Agentforce AI Implementation.pdf
assetexplorer- product-overview - presentation
Operating system designcfffgfgggggggvggggggggg
Download FL Studio Crack Latest version 2025 ?
Odoo Companies in India – Driving Business Transformation.pdf
L1 - Introduction to python Backend.pptx
AutoCAD Professional Crack 2025 With License Key
Why Generative AI is the Future of Content, Code & Creativity?
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Patient Appointment Booking in Odoo with online payment
wealthsignaloriginal-com-DS-text-... (1).pdf
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Internet Downloader Manager (IDM) Crack 6.42 Build 41
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

Information and network security 8 security mechanisms

  • 1. Information and Network Security: 8 Security Mechanisms Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Security Mechanism • feature designed to detect, prevent, or recover from a security attack • no single mechanism that will support all services required • however one particular element underlies many of the security mechanisms in use: • cryptographic techniques • hence our focus on this topic • “Security Mechanism” are the specific means of implementing one or more security services. Note these mechanisms span a wide range of technical components, but one aspect seen in many is the use of cryptographic techniques.
  • 3. Security Mechanisms (X.800) •specific security mechanisms: • encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization •pervasive security mechanisms: • trusted functionality, security labels, event detection, security audit trails, security recovery
  • 4. Security Mechanisms (X.800) • Some examples of mechanisms from X.800. Note that the “specific security mechanisms” are protocol layer specific, whilst the “pervasive security mechanisms” are not. • We will meet some of these mechanisms in much greater detail later.
  • 5. Specific security mechanisms • SPECIFIC SECURITY MECHANISMS • May be incorporated into the appropriate protocol layer in order to provide some of the OSI security services. • Encipherment • The use of mathematical algorithms to transform data into a form that is not readily intelligible.The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
  • 6. Specific security mechanisms • Digital Signature • Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient). • Access Control • A variety of mechanisms that enforce access rights to resources. • Data Integrity • A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
  • 7. Specific security mechanisms • Authentication Exchange A mechanism intended to ensure the identity of an entity by means of information exchange. • Traffic Padding The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts. • Routing Control Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected. • Notarization The use of a trusted third party to assure certain properties of a data exchange.
  • 8. Pervasive security mechanisms • PERVASIVE SECURITY MECHANISMS • Mechanisms that are not specific to any particular OSI security service or protocol layer. • Trusted Functionality That which is perceived to be correct with respect to some criteria (e.g., as established by a security policy). • Security Label The marking bound to a resource (which may be a data unit) that names or designates the security attributes of that resource.
  • 9. Pervasive security mechanisms • Event Detection Detection of security-relevant events. • Security Audit Trail Data collected and potentially used to facilitate a security audit, which is an independent review and examination of system records and activities. • Security Recovery Deals with requests from mechanisms, such as event handling and management functions, and takes recovery actions.
  • 10. Assignment • What do you understand by security mechanism • Explain Specific security mechanisms • Explain Pervasive security mechanisms