Ch01 Crypto7e
Ch01 Crypto7e
y and
Network
Security
Seventh Edition
by William Stallings
Integrity
• Data integrity
• Assures that information and programs are changed only in a
specified and authorized manner
• System integrity
• Assures that a system performs its intended function in an
unimpaired manner, free from deliberate or inadvertent unauthorized
manipulation of the system
Availability
• Assures that systems work promptly and service is not denied
to authorized users
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Breach of Security
Levels of Impact
• The loss could be expected to have a severe
or catastrophic adverse effect on
organizational operations, organizational
High assets, or individuals
• Security mechanism
• A process (or a device incorporating such a process) that
is designed to detect, prevent, or recover from a security
attack
• Security service
• A processing or communication service that enhances
the security of the data processing systems and the
information transfers of an organization
• Intended to counter security attacks, and they make use
of one or more security mechanisms to provide the
service
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Table 1.1
Threats and Attacks (RFC
4949)
•A passive attack
attempts to learn or make
use of information from
the system but does not
affect system resources
Security
Services
(X.800)
Security
Mechanisms
(X.800)
• NIST is a U.S. federal agency that deals with measurement science, standards, and
technology related to U.S. government use and to the promotion of U.S. private-sector
innovation
• Despite its national scope, NIST Federal Information Processing Standards (FIPS) and Special
Publications (SP) have a worldwide impact
Internet Society
Security
Security Security
Requirem
Attacks Enforcers
ents
Summary
• Computer security • Security services
concepts • Authentication
• Definition • Access control
• Data confidentiality
• Examples
• Data integrity
• Challenges • Nonrepudiation
• Availability service
• The OSI security
architecture • Security mechanisms