1.2. The OSI Security Architecture
To assess
effectively the security needs of an organization and to evaluate and choose
various security products and policies, the manager responsible for security
needs some systematic way of defining the requirements for security and
characterizing the approaches to satisfying those requirements. This is
difficult enough in a centralized data processing environment; with the use of
local and wide area networks, the problems are compounded.
ITU-T[2] Recommendation X.800, Security Architecture for OSI, defines such a
systematic approach.[3] The OSI security architecture is useful to managers as a
way of organizing the task of providing security. Furthermore, because this
architecture was developed as an international standard, computer and
communications vendors have developed security features for their products and
services that relate to this structured definition of services and
mechanisms.
[2] The International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T) is a United Nationssponsored agency that develops standards, called Recommendations, relating to telecommunications and to open systems interconnection (OSI).
[3] The OSI security architecture was developed in the context of the OSI protocol architecture, which is described in Appendix H. However, for our purposes in this chapter, an understanding of the OSI protocol architecture is not required.
For our purposes, the OSI security architecture provides a
useful, if abstract, overview of many of the concepts that this book deals with.
The OSI security architecture focuses on security attacks, mechanisms, and
services. These can be defined briefly as follows:
-
Security attack: Any action that compromises the security of information owned by an organization.
-
Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.
-
Security service: A processing or communication service that enhances the security of the data
-
processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
In the literature, the terms threat and attack are
commonly used to mean more or less the same thing. Table 1.1 provides definitions taken from RFC 2828,
Internet Security Glossary.
Threats and Attacks (RFC 2828)
Threat
A potential for violation of security, which exists when there
is a circumstance, capability, action, or event that could breach security and
cause harm. That is, a threat is a possible danger that might exploit a
vulnerability.
Attack
An assault on system security that derives from an intelligent
threat; that is, an intelligent act that is a deliberate attempt (especially in
the sense of a method or technique) to evade security services and violate the
security policy of a system.
No comments:
Post a Comment