Access Control
In the context of network security, access control is the
ability to limit and control the access to host systems and applications via
communications links. To achieve this, each entity trying to gain access must
first be identified, or authenticated, so that access rights can be tailored to
the individual.
Data Confidentiality
Confidentiality is the protection of transmitted data from
passive attacks. With respect to the content of a data transmission, several
levels of protection can be identified. The broadest service protects all user
data transmitted between two users over a period of time. For example, when a
TCP connection is set up between two systems, this broad protection prevents the
release of any user data transmitted over the TCP connection. Narrower forms of
this service can also be defined, including the protection of a single message
or even specific fields within a message. These refinements are less useful than
the broad approach and may even be more complex and expensive to implement.
The other aspect of confidentiality is the protection of
traffic flow from analysis. This requires that an attacker not be able to
observe the source and destination, frequency, length, or other characteristics
of the traffic on a communications facility.
Data Integrity
As with confidentiality, integrity can apply to a stream of
messages, a single message, or selected fields within a message. Again, the most
useful and straightforward approach is total stream protection.
A connection-oriented integrity
service, one that deals with a stream of messages, assures that messages are
received as sent, with no duplication, insertion, modification, reordering, or
replays. The destruction of data is also covered under this service. Thus, the
connection-oriented integrity service addresses both message stream modification
and denial of service. On the other hand, a connectionless integrity service,
one that deals with individual messages without regard to any larger context,
generally provides protection against message modification only.
We can make a distinction between the service with and without
recovery. Because the integrity service relates to active attacks, we are
concerned with detection rather than prevention. If a violation of integrity is
detected, then the service may simply report this violation, and some other
portion of software or human intervention is required to recover from the
violation. Alternatively, there are mechanisms available to recover from the
loss of integrity of data, as we will review subsequently. The incorporation of
automated recovery mechanisms is, in general, the more attractive
alternative.
No comments:
Post a Comment