OSI Security Architecture
OSI Security Architecture
The OSI model can be considered a universal language for computer networking. It
is based on the concept of divide and conquer, it splits up the communication system
into 7 abstract layers, and the layer is stacked upon the previous layer. OSI model
has seven layers which are as follows:
• The Physical Layer
• The Data Link Layer
• The Network Layer
• The Transport Layer
• The Session Layer
• The Presentation Layer
• The Application Layer
1. Security Attacks
• Active Attacks: Active attacks refer to types of attacks that involve the attacker
actively disrupting or altering system, network, or device activity. Active attacks
are typically focused on causing damage or disruption, rather than gathering
information or intelligence. Here, both the sender and receiver have no clue that
their message/ data is modified by some third-party intruder. The message/ data
transmitted doesn’t remain in its usual form and shows deviation from its usual
behaviour. This makes active attacks dangerous as there is no information
provided of the attack happening in the communication process and the receiver
is not aware that the data/ message received is not from the sender. Active attacks
are further divided into four parts based on their behaviour:
2. Security Mechanism
The mechanism that is built to identify any breach of security or attack on the
organization, is called a security mechanism. Security Mechanisms are also
responsible for protecting a system, network, or device against unauthorized access,
tampering, or other security threats.
3. Security Services
Security services refer to the different services available for maintaining the security
and safety of an organization. They help in preventing any potential risks to security.
Security services are divided into 5 types:
• Authentication: Authentication is the process of verifying the identity of a user
or device in order to grant or deny access to a system or device.
• Access control: Access Control involves the use of policies and procedures to
determine who is allowed to access specific resources within a system.
• Data Confidentiality: Data Confidentiality is responsible for the protection of
information from being accessed or disclosed to unauthorized parties.
• Data integrity: Data Integrity is a security mechanism that involves the use of
techniques to ensure that data has not been tampered with or altered in any way
during transmission or storage.
• Non- repudiation: Non-repudiation involves the use of techniques to create a
verifiable record of the origin and transmission of a message, which can be used
to prevent the sender from denying that they sent the message.