Security Mechanisms (X.800):-
Security mechanisms are used to implement security services. Lists of security mechanisms defined in X.800. The mechanisms are divided into those that are implemented in a specific protocol layer, such as TCP or an application-layer protocol, and those that are not specific to any particular protocol layer or security service.
- Specific security mechanisms
- Encipherment
- Digital signatures
- Access controls
- Data integrity
- Authentication exchange
- traffic padding
- routing control
- notarization
- Pervasive security mechanisms
- Trusted functionality
- Security labels
- Event detection
- Security audit trails
- Security recovery
• Encipherment:-
The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
• Digital signature:-
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient).
• Access Control:-
A variety of mechanisms that enforce access rights to Resources.
• Data Integrity:-
A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
• Authentication Exchange:-
A mechanism intended to ensure the identity of an entity by means of information exchange.
• Traffic Padding:-
The insertion of bits into gaps in a data stream to frustrate eavesdropper’s traffic analysis attempts.
• Routing Control:-
Enables selection of particular physically secure Routes for certain data and allows routing changes, especially when a breach of security is suspected.
• Notarization:-
The use of a trusted third party to assure certain properties of a data exchange.
• Trusted Functionality:-
That which is perceived to be correct with respect to some criteria(e.g., as establish by a security policy).
• Security labels:-
The marking bound to a resource (which may be a data unit) that name or designates the security attributes of that resources.
• Event Detection:-
Detection of security-relevant events.
• Security Audit Trails:-
Data collected and potentially used to facilitate a security audit, which is an independent review and examination of system records and activities.
• Security recovery:-
Deal with requests from mechanisms, such as event handling and management functions and takes recovery functions.
0 Comments