Podcast
Questions and Answers
What is the primary purpose of bit stuffing in data transmission?
What is the primary purpose of bit stuffing in data transmission?
What does a digital signature primarily ensure in data transmission?
What does a digital signature primarily ensure in data transmission?
Which mechanism is used to select secure routes for data under suspicious conditions?
Which mechanism is used to select secure routes for data under suspicious conditions?
What is the purpose of a security audit trail?
What is the purpose of a security audit trail?
Signup and view all the answers
What role does trusted functionality play in security mechanisms?
What role does trusted functionality play in security mechanisms?
Signup and view all the answers
What is a common method used in masquerade attacks?
What is a common method used in masquerade attacks?
Signup and view all the answers
Which of the following best describes a replay attack?
Which of the following best describes a replay attack?
Signup and view all the answers
What does message modification involve?
What does message modification involve?
Signup and view all the answers
What does a denial of service attack primarily prevent?
What does a denial of service attack primarily prevent?
Signup and view all the answers
How is authentication typically secured?
How is authentication typically secured?
Signup and view all the answers
What determines who can access data in an access control system?
What determines who can access data in an access control system?
Signup and view all the answers
Which principle ensures that only the sender and receiver can access shared information?
Which principle ensures that only the sender and receiver can access shared information?
Signup and view all the answers
What is non-repudiation in security services?
What is non-repudiation in security services?
Signup and view all the answers
What is the primary focus of the OSI security architecture?
What is the primary focus of the OSI security architecture?
Signup and view all the answers
Which of the following best describes a security mechanism?
Which of the following best describes a security mechanism?
Signup and view all the answers
What characterizes a passive attack?
What characterizes a passive attack?
Signup and view all the answers
Which type of passive attack involves analyzing transmitted information without accessing its content?
Which type of passive attack involves analyzing transmitted information without accessing its content?
Signup and view all the answers
What is a common technique used to mask the contents of messages during a passive attack?
What is a common technique used to mask the contents of messages during a passive attack?
Signup and view all the answers
Which of the following is NOT a type of active attack?
Which of the following is NOT a type of active attack?
Signup and view all the answers
What is a defining characteristic of a masquerade attack?
What is a defining characteristic of a masquerade attack?
Signup and view all the answers
What distinguishes an active attack from a passive attack?
What distinguishes an active attack from a passive attack?
Signup and view all the answers
What is the primary purpose of integrity in data communication?
What is the primary purpose of integrity in data communication?
Signup and view all the answers
Which security mechanism establishes proof of origin and integrity of data?
Which security mechanism establishes proof of origin and integrity of data?
Signup and view all the answers
How does encipherment protect data during communication?
How does encipherment protect data during communication?
Signup and view all the answers
What role does notarization play in communication security?
What role does notarization play in communication security?
Signup and view all the answers
Which mechanism is used specifically to enforce access rights to resources?
Which mechanism is used specifically to enforce access rights to resources?
Signup and view all the answers
What is the result if the integrity of a message is compromised during its transmission?
What is the result if the integrity of a message is compromised during its transmission?
Signup and view all the answers
What does authentication exchange ensure in data communication?
What does authentication exchange ensure in data communication?
Signup and view all the answers
Which security mechanism focuses on maintaining the accuracy of data units?
Which security mechanism focuses on maintaining the accuracy of data units?
Signup and view all the answers
Study Notes
OSI Security Architecture
- Focuses on security attacks, mechanisms, and services.
- Security attack: Action that compromises organizational information security.
- Security mechanism: Process to detect, prevent, or recover from security attacks.
- Security service: Enhances the security of data processing systems and information transfers.
Security Attacks
- Attacks can be categorized as passive or active.
Passive Attacks
- Aim to gather information without altering system resources.
- Two types:
- Release of message contents: Capturing sensitive information in communications (e.g., phone calls, emails).
- Traffic analysis: Analyzing patterns of traffic without revealing content; commonly masked by encryption.
- Difficult to detect as they do not alter data.
Active Attacks
- Involve modification of data streams.
- Subdivided into:
- Masquerade: Intruder impersonates a legitimate user to gain unauthorized access.
- Replay: Captured data reused to deceive the receiver; the receiver thinks it’s an original message.
- Message modification: Altering message contents to produce unauthorized effects (e.g., changing file access permissions).
- Denial of Service (DoS): Disrupting normal communication services to target specific entities.
Security Services
- Authentication: Verifying user or system identity, often through usernames and passwords.
- Access Control: Regulating who can access information and the extent of their access.
- Confidentiality: Ensuring only authorized parties can access shared information, protecting against unauthorized access.
- Integrity: Assuring received information is accurate and unaltered during transmission.
- Non-repudiation: Ensuring proof of origin and integrity of data, preventing either party from denying the receipt or sending of messages.
Security Mechanisms
- Encipherment: Hiding data through algorithms, ensuring confidentiality.
- Access Control: Mechanisms to enforce user access rights to resources.
- Notarization: Involves a trusted third party to mediate communication, reducing conflict risks.
- Data Integrity: Mechanisms ensuring the consistency and accuracy of data.
- Authentication exchange: Two-way confirmation of identities at the TCP/IP layer.
- Traffic padding (Bit stuffing): Adding extra bits to ensure data integrity during transmission.
- Digital Signature: Electronic signature added by the sender to verify identity and data integrity.
- Routing Control: Selects secure physical routes for sensitive data.
Pervasive Security Mechanisms
- Trusted Functionality: Identifies correct processes per security policy.
- Security Label: Enhances object security through labels attached to data.
- Event Detection: Identifies security-relevant events.
- Security Audit Trail: Collects data for independent reviews of security systems.
- Security Recovery: Mechanisms for recovering from security breaches.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers Module 1, Topics 2 and 3 of SWE3002, focusing on the OSI security architecture. Key concepts include security attacks, mechanisms, and services essential for safeguarding information. Test your knowledge on how these elements work together to secure organizational data.