Security Mechanisms:-

 Security Mechanisms (X.800):-

                          Security mechanisms are used to implement security services. Lists of security mechanisms defined in X.800. The mechanisms are divided into those that are implemented in a specific protocol layer, such as TCP or an application-layer protocol, and those that are not specific to any particular protocol layer or security service.  

  1. Specific security mechanisms
    1. Encipherment
    2. Digital signatures
    3. Access controls
    4. Data integrity
    5. Authentication exchange
    6. traffic padding
    7. routing control
    8. notarization  
  2. Pervasive security mechanisms
    1. Trusted functionality
    2. Security labels
    3. Event detection
    4. Security audit trails
    5. Security recovery 

• Encipherment:-

                   The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.

• Digital signature:-

                    Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient).

• Access Control:-

                    A variety of mechanisms that enforce access rights to Resources.

• Data Integrity:-

                     A variety of mechanisms used to assure the integrity of a data unit or stream of data units.

• Authentication Exchange:-

                     A mechanism intended to ensure the identity of an entity by means of information exchange.

• Traffic Padding:-

                     The insertion of bits into gaps in a data stream to frustrate eavesdropper’s traffic analysis attempts.

• Routing Control:-

                     Enables selection of particular physically secure Routes for certain data and allows routing changes, especially when a breach of security is suspected.

• Notarization:-

                    The use of a trusted third party to assure certain properties of a data exchange.

• Trusted Functionality:-

                   That which is perceived to be correct with respect to some criteria(e.g., as establish by a security policy).

• Security labels:-

                  The marking bound to a resource (which may be a data unit) that name or designates the security attributes of that resources.

• Event Detection:-

                Detection of security-relevant events.

• Security Audit Trails:-

               Data collected and potentially used to facilitate a security audit, which is an independent review and examination of system records and activities.

• Security recovery:-

                Deal with requests from mechanisms, such as event handling and management functions and takes recovery functions. 






Post a Comment

0 Comments