您的位置:首页 > 其它

密码学——OSI安全框架(Cryptography - The OSI Security Architecture)

2017-07-27 14:16 211 查看
The OSI Security Architecture

To assess effectively the security needs of an organisation and to evaluate and choose various security products and policies, we need some systematic way of defining the requirements for security and characterising the approaches to satisfying those requirements. The OSI Security Architecture focuses on three essential parts: security attacks, security mechanisms and security services.

Security attack: Any action that compromise the security of information owned by an organization.

Security mechanism: Any process that is used to detect, prevent or recover from a security attack.

Security service: Any processing or communication service that enhances the security of data processing systems and the information transformation of an organisation.

Security Attack

Security attacks can be classified into passive attacks and active attacks.

A passive attack attempts to learn or make use of information from a system without affecting system resources.

An active attack attempts to modify system resources or affect their operations.

Passive Attack

The goal of opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis.

The release of message contents is quite clear. For example, somebody is watching your secret email, monitoring what information you are sending and receiving.



Traffic analysis. For example, to prevent the release of messages of your secret email, you use some encryption algorithm to mask your email contents. The hacker might not see the contents but could determine the location, identify the communication hosts and observe the frequency and the length of exchanged messages.



Passive attack is vey difficult to detect due to huge amount of data. Hence, we are focusing on prevention rather than detection.

Active attack

Active attack involves some modification of data stream and creation of false stream. It can be divided into four categories: masquerade, replay, modification of messages and denial of services.

masquerade: one entity pretends to be a different entity. For example,



Replay: refers to the passive capture of a data unit and its subsequent retransmission to produce an unauthorised effort.



Modification of message: means some portion of a legitimate message is altered. For example, a message means “I love you” is altered to be “I hate you”.



The denial of service prevents the access of some services or the use of some facilities.



Security Mechanism



Security Service



写在最后的话(PS)

All texts above are from “Cryptography and Network Security: Principles and Practice, 6/E by William Stallings “.

Welcome questions always and forever. ^_^
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: