ๅฐŠๆ•ฌ็š„ ๅพฎไฟกๆฑ‡็Ž‡๏ผš1ๅ†† โ‰ˆ 0.046166 ๅ…ƒ ๆ”ฏไป˜ๅฎๆฑ‡็Ž‡๏ผš1ๅ†† โ‰ˆ 0.046257ๅ…ƒ [้€€ๅ‡บ็™ปๅฝ•]
SlideShare a Scribd company logo
Inam Ul Haq
MS Computer Science (Sweden)
Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org
Discussion forum: questions.computingcage.com
Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia,
Michealjfox, Association for Information Systems and Internet Society.
Network Security
1 Network Security, University of Okara
Lecture 3: OSI Security Architecture
Table of Contents
Network Security, University of Okara2
๏‚— OSI Security Architecture
๏‚— 4 Common Attacks
๏‚— Handling Attacks
๏‚— Exercise
OSI Security Architecture
Network Security, University of Okara3
๏‚ง An international and systematic standard of
defining and providing security requirements.
๏‚ง Used by IT managers and vendors in their
products
๏‚ง Proposed by ITU-T in recommendations X.800
as โ€œSecurity Architecture for OSIโ€
๏‚— security attack
๏‚— security mechanism (control)
๏‚— A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
๏‚— security service
๏‚— enhances the security of the data processing systems and the
information transfers of an organization
Security Mechanisms (X.800)
Network Security, University of Okara4
๏‚— Specific Security Mechanisms:
๏‚— encipherment, digital signatures, access controls, data
integrity, authentication exchange, traffic padding,
routing control, notarization
๏‚— Pervasive Security Mechanisms:
๏‚— trusted functionality, security labels, event detection,
security audit trails, security recovery
4 Common Types of Threats
Network Security, University of Okara5
Network Security, University of Okara6
4 Common Types of Threats (2)
Handling Attacks
Network Security, University of Okara7
๏‚— Passive attacks โ€“ focus on Prevention
๏‚— Easy to stop
๏‚— Hard to detect
๏‚— Active attacks โ€“ focus on Detection and
Recovery
๏‚— Hard to stop
๏‚— Easy to detect
Exercise
Network Security, University of Okara8
1. What is the OSI security architecture?
2. What is the difference between passive and active
security threats?
3. List and briefly define categories of passive and
active security attacks.
4. List and briefly define categories of security
services.
5. List and briefly define categories of security
mechanisms.

More Related Content

What's hot

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
ย 
User authentication
User authenticationUser authentication
User authentication
CAS
ย 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
SHUBHA CHATURVEDI
ย 
Cryptography ppt
Cryptography pptCryptography ppt
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
ย 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
ย 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
ย 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
ย 
Intruders
IntrudersIntruders
Intruders
Dr.Florence Dayana
ย 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
ย 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
ย 
Email security
Email securityEmail security
Email security
Baliram Yadav
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
ย 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
ย 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
ย 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
ย 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
ย 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
ย 

What's hot (20)

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
ย 
User authentication
User authenticationUser authentication
User authentication
ย 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
ย 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
ย 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
ย 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
ย 
IP Security
IP SecurityIP Security
IP Security
ย 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
ย 
Intruders
IntrudersIntruders
Intruders
ย 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
ย 
block ciphers
block ciphersblock ciphers
block ciphers
ย 
Email security
Email securityEmail security
Email security
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
ย 
Cryptography
CryptographyCryptography
Cryptography
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
ย 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
ย 
Network attacks
Network attacksNetwork attacks
Network attacks
ย 
S/MIME
S/MIMES/MIME
S/MIME
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
ย 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
ย 

Viewers also liked

02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
Joe McCarthy
ย 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
ย 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
ย 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
ย 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
ย 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
ย 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
Netwax Lab
ย 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
ย 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
ย 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
ย 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
ย 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
ย 
Network security
Network securityNetwork security
Network security
Gichelle Amon
ย 

Viewers also liked (13)

02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
ย 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
ย 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
ย 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
ย 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
ย 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
ย 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
ย 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
ย 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
ย 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
ย 
Computer Security
Computer SecurityComputer Security
Computer Security
ย 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
ย 
Network security
Network securityNetwork security
Network security
ย 

Similar to OSI Security Architecture

CH01.ppt
CH01.pptCH01.ppt
CH01.ppt
ShahidMehmood285010
ย 
Lecture 1
Lecture 1Lecture 1
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
Computing Cage
ย 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
kumarkaushal17
ย 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
ssuserec53e73
ย 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
Pandiya Rajan
ย 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
Tamer Nadeem
ย 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
faizalkhan673954
ย 
Nw sec
Nw secNw sec
Nw sec
shivz3
ย 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
university of education,Lahore
ย 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
DHANABALSUBRAMANIAN
ย 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
shanthishyam
ย 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
ย 
ุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุช
ุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุชุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุช
ุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุช
Amr Rashed
ย 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
tahirnaquash2
ย 
Network security
Network securityNetwork security
Network security
Simalike Peter
ย 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
IJNSA Journal
ย 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
osama elfar
ย 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
Feisal Nanji
ย 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
ย 

Similar to OSI Security Architecture (20)

CH01.ppt
CH01.pptCH01.ppt
CH01.ppt
ย 
Lecture 1
Lecture 1Lecture 1
Lecture 1
ย 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
ย 
osi-security-architectureppt.pptx
osi-security-architectureppt.pptxosi-security-architectureppt.pptx
osi-security-architectureppt.pptx
ย 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
ย 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
ย 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
ย 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
ย 
Nw sec
Nw secNw sec
Nw sec
ย 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
ย 
Unit 1.ppt
Unit 1.pptUnit 1.ppt
Unit 1.ppt
ย 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
ย 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
ย 
ุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุช
ุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุชุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุช
ุงู…ู† ู†ุธู… ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงู…ู† ุงู„ุดุจูƒุงุช
ย 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
ย 
Network security
Network securityNetwork security
Network security
ย 
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...
ย 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
ย 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
ย 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
ย 

More from university of education,Lahore

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
university of education,Lahore
ย 
Steganography
SteganographySteganography
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
university of education,Lahore
ย 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
university of education,Lahore
ย 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
university of education,Lahore
ย 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
university of education,Lahore
ย 
SEO
SEOSEO
A Star Search
A Star SearchA Star Search
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
university of education,Lahore
ย 
Uml Diagrams
Uml DiagramsUml Diagrams
eDras Max
eDras MaxeDras Max
RAD Model
RAD ModelRAD Model
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
university of education,Lahore
ย 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
university of education,Lahore
ย 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
university of education,Lahore
ย 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
university of education,Lahore
ย 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
university of education,Lahore
ย 
Java Script
Java ScriptJava Script
Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1
university of education,Lahore
ย 
Group 11 introduction to registers and counters
Group 11 introduction to registers and countersGroup 11 introduction to registers and counters
Group 11 introduction to registers and counters
university of education,Lahore
ย 

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
ย 
Steganography
SteganographySteganography
Steganography
ย 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
ย 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
ย 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
ย 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
ย 
SEO
SEOSEO
SEO
ย 
A Star Search
A Star SearchA Star Search
A Star Search
ย 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
ย 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
ย 
eDras Max
eDras MaxeDras Max
eDras Max
ย 
RAD Model
RAD ModelRAD Model
RAD Model
ย 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
ย 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
ย 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
ย 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
ย 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
ย 
Java Script
Java ScriptJava Script
Java Script
ย 
Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1Group 10 flip flop and rs latch 1
Group 10 flip flop and rs latch 1
ย 
Group 11 introduction to registers and counters
Group 11 introduction to registers and countersGroup 11 introduction to registers and counters
Group 11 introduction to registers and counters
ย 

Recently uploaded

managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
ย 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
ย 
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
Kalna College
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
ย 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
MattVassar1
ย 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
ย 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
ย 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
ย 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
roshanranjit222
ย 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
ย 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
Forum of Blended Learning
ย 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
ย 
Slides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptxSlides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptx
shabeluno
ย 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
ย 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
Celine George
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
ย 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
chaudharyreet2244
ย 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
Friends of African Village Libraries
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
ย 

Recently uploaded (20)

managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
ย 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
ย 
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
ย 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
ย 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
ย 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
ย 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
ย 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
ย 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
ย 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
ย 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
ย 
Slides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptxSlides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptx
ย 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
ย 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
ย 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
ย 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
ย 

OSI Security Architecture

  • 1. Inam Ul Haq MS Computer Science (Sweden) Inam.bth@gmail.com, mr.inam.ulhaq@ieee.org Discussion forum: questions.computingcage.com Member of IEEE, ACM, Movement Disorder Society, PDF, BossMedia, Michealjfox, Association for Information Systems and Internet Society. Network Security 1 Network Security, University of Okara Lecture 3: OSI Security Architecture
  • 2. Table of Contents Network Security, University of Okara2 ๏‚— OSI Security Architecture ๏‚— 4 Common Attacks ๏‚— Handling Attacks ๏‚— Exercise
  • 3. OSI Security Architecture Network Security, University of Okara3 ๏‚ง An international and systematic standard of defining and providing security requirements. ๏‚ง Used by IT managers and vendors in their products ๏‚ง Proposed by ITU-T in recommendations X.800 as โ€œSecurity Architecture for OSIโ€ ๏‚— security attack ๏‚— security mechanism (control) ๏‚— A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. ๏‚— security service ๏‚— enhances the security of the data processing systems and the information transfers of an organization
  • 4. Security Mechanisms (X.800) Network Security, University of Okara4 ๏‚— Specific Security Mechanisms: ๏‚— encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization ๏‚— Pervasive Security Mechanisms: ๏‚— trusted functionality, security labels, event detection, security audit trails, security recovery
  • 5. 4 Common Types of Threats Network Security, University of Okara5
  • 6. Network Security, University of Okara6 4 Common Types of Threats (2)
  • 7. Handling Attacks Network Security, University of Okara7 ๏‚— Passive attacks โ€“ focus on Prevention ๏‚— Easy to stop ๏‚— Hard to detect ๏‚— Active attacks โ€“ focus on Detection and Recovery ๏‚— Hard to stop ๏‚— Easy to detect
  • 8. Exercise Network Security, University of Okara8 1. What is the OSI security architecture? 2. What is the difference between passive and active security threats? 3. List and briefly define categories of passive and active security attacks. 4. List and briefly define categories of security services. 5. List and briefly define categories of security mechanisms.
  ็ฟป่ฏ‘๏ผš