C1. Overview
C1. Overview
C1. Overview
Sixth Edition
by William Stallings
Overview
Asymmetric encryption
Authentication protocols
measures to deter,
prevent, detect, and
correct security
violations that involve
the transmission of
information
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and
authorized manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner,
free from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to
authorized users
Authenticity Accountability
• Verifying that users • The security goal
are who they say that generates the
they are and that requirement for
each input arriving at actions of an entity to
the system came be traced uniquely to
from a trusted source that entity
A means of classifying
security attacks, used both in
X.800 and RFC 4949, is in
terms of passive attacks and
active attacks
• A passive attack attempts to
learn or make use of
information from the system
but does not affect system
resources
• An active attack attempts to
alter system resources or
affect their operation
• Authentication
• Access control
• Data confidentiality
• Data integrity
• Non-repudiation
Security
Services
(X.800)
Security
Mechanisms
(X.800)