Answer Questions Below In A Paragraph Each, Total 500 Words
Answer Questions Below In A Paragraph Each Total 500 Words
1.1 The OSI (Open Systems Interconnection) security architecture is a conceptual framework designed to guide the development and implementation of security measures across different network layers. It aligns security functions with the OSI reference model, which comprises seven layers: physical, data link, network, transport, session, presentation, and application. The architecture emphasizes the integration of security services such as confidentiality, integrity, authentication, and access control at each layer to ensure comprehensive protection. It also advocates for security policies that define security goals, procedures for implementing security measures, and mechanisms for managing security risks across diverse network systems. This layered approach allows security functions to be embedded systematically, enabling interoperable and flexible defenses that adapt to evolving threats and vulnerabilities within complex network environments.
1.2 Passive security threats involve eavesdropping or monitoring of data transmissions without altering or disrupting the communication. These threats primarily aim to gather sensitive information for malicious purposes, such as espionage or theft, without detection. Active security threats, on the other hand, involve deliberate actions to alter, disrupt, or destroy data or network operations. Such threats include attacks like vandalism, spoofing, or data modification, which actively interfere with or compromise system integrity. While passive threats are difficult to detect due to their undetectable nature, active threats are often easier to identify because they cause noticeable disruptions or anomalies in system behavior, requiring different strategies for prevention and mitigation.
1.3 Categories of passive security attacks include eavesdropping, traffic analysis, and interception, which aim to secretly monitor or capture data transmitted over networks without consent. Eavesdropping involves listening in on communications, while traffic analysis examines patterns to infer information. Interception involves capturing data packets for later examination. Active security attacks encompass tampering, such as data modification or insertion, impersonation or spoofing, which falsifies identities to gain unauthorized access, and denial-of-service (DoS) attacks that flood systems with unnecessary requests to disrupt normal services. These attacks interfere directly with system operations or data integrity, requiring robust preventive and detection mechanisms to protect the network.
1.4 Security services are operations provided by security mechanisms to ensure the protection of information and systems. Confidentiality ensures that data is accessible only to authorized parties; authentication verifies the identities of users or systems; integrity guarantees that data is accurate and unaltered; access control restricts resource usage based on permissions; non-repudiation prevents denial of actions performed; and availability ensures that resources are accessible when needed. These services form the foundation for safeguarding data against threats and attacks, supporting secure communication and data management in networked environments.
1.5 Security mechanisms are technical measures and controls implemented to provide security services. Examples include encryption algorithms and protocols that ensure confidentiality and integrity; access control systems that restrict resource usage; authentication protocols for verifying identities; firewalls and intrusion detection systems that monitor network traffic; digital signatures and certificates for non-repudiation; and security policies that govern overall security practices. These mechanisms are essential tools for implementing and enforcing security policies, enabling organizations to defend against various threats efficiently and effectively.
1.6 Fundamental security design principles include least privilege, ensuring users have only the access necessary; defense in depth, deploying multiple layers of security controls; fail-safe defaults, denying access unless explicitly permitted; separation of duties to prevent fraud and errors; open design, avoiding security by obscurity; transparency and simplicity for easier management; and security best practices based on proven standards. These principles help create robust, resilient systems by minimizing vulnerabilities and ensuring security mechanisms complement one another to withstand attacks.
1.7 The attack surface refers to the total sum of all points in a system where an attacker can possibly exploit vulnerabilities to gain unauthorized access or cause harm. It encompasses all entry points, channels, or methods that could be targeted. An attack tree, in contrast, is a systematic diagram that models the potential paths an attacker might follow to compromise a system. It illustrates various attack scenarios, including the different tactics, techniques, and steps an attacker could take, organized in a hierarchical structure. While the attack surface provides a broad perspective of potential vulnerabilities, the attack tree offers a detailed view of specific attack strategies, helping security professionals identify and mitigate particular risks.
References
- Stallings, W. (2017). Network Security Essentials: Applications and Standards. Pearson.
- Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach. Pearson.
- Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
- Schneier, B. (2015). Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. W. W. Norton & Company.
- Garcia, M., & Grata, P. (2019). Principles of Information Security. Elsevier.
- Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
- Pfleeger, C. P., & Pfleeger, S. L. (2014). Security in Computing. Prentice Hall.
- Ma, J., & Aitzhan, N. Z. (2021). Security and Privacy in Emerging Smart Network Infrastructures. IEEE.
- NIST Special Publication 800-53 (2020). Security and Privacy Controls for Information Systems and Organizations.
- Frei, S., & Trappe, W. (2014). Attack Surface Management. IEEE Security & Privacy.