OSI Security Architecture - GeeksforGeeks (2024)

Last Updated : 24 Jun, 2024

Summarize

Comments

Improve

The OSI Security Architecture is internationally recognized and provides a standardized technique for deploying security measures within an organization. It focuses on three major concepts: security attacks, security mechanisms, and security services, which are criticalin protecting data and communication processes. In this article, we will discuss OSI Security Architecture.

What is the OSI Model?

The OSI model can be considered a universal language for computer networking. It is based on the concept of divide and conquer, it splits up the communication system into 7 abstract layers, and the layer is stacked upon the previous layer.OSI model has seven layers which are as follows:

  • The Physical Layer
  • The Data Link Layer
  • The Network Layer
  • The Transport Layer
  • The Session Layer
  • The Presentation Layer
  • The Application Layer

What is OSI Security?

OSI (Open Systems Interconnection) security refers to a set of protocols, standards, and techniques used to ensure the security of data and communications in a network environment based on the OSI model. The International Organisation for Standardisation (ISO) established this model to provide a conceptual framework for understanding how different networking protocols interact within a layered architecture.

Classification of OSI Security Architecture

The OSI (Open Systems Interconnection) Security Architecture defines a systematic approach to providing security at each layer. It defines security services and security mechanisms that can be used at each of the seven layers of the OSI model to provide security for data transmitted over a network. These security services and mechanisms help to ensure the confidentiality, integrity, and availability of the data. OSI architecture is internationally acceptable as it lays the flow of providing safety in an organization. OSI Security Architecture focuses on these concepts:

  • Security Attack
  • Security mechanism
  • Security Service

OSI Security Architecture - GeeksforGeeks (1)

Classification of OSI Security Architecture

OSI Security Architecture is categorized into three broad categories namely Security Attacks, Security mechanisms, and Security Services. We will discuss each in detail:

1. Security Attacks

A security attack is an attempt by a person or entity to gain unauthorized access to disrupt or compromise the security of a system, network, or device. These are defined as the actions that put at risk an organization’s safety. They are further classified into 2 sub-categories:

  • Passive Attack: Attacks in which a third-party intruder tries to access the message/ content/ data being shared by the sender and receiver by keeping a close watch on the transmission or eave-dropping the transmission is called Passive Attacks. These types of attacks involve the attacker observing or monitoring system, network, or device activity without actively disrupting or altering it. Passive attacks are typically focused on gathering information or intelligence, rather than causing damage or disruption. Here, both the sender and receiver have no clue that their message/ data is accessible to some third-party intruder. The message/ data transmitted remains in its usual form without any deviation from its usual behavior. This makes passive attacks very risky as there is no information provided about the attack happening in the communication process. Passive attacks are further divided into two parts based on their behavior:
    • Eavesdropping: Eavesdropping involves the attacker intercepting and listening to communications between two or more parties without their knowledge or consent. Eavesdropping can be performed using a variety of techniques, such as packet sniffing, or man-in-the-middle attacks.
    • Traffic analysis: This involves the attacker analyzing network traffic patterns and metadata to gather information about the system, network, or device. Here the intruder can’t read the message but only understand the pattern and length of encryption. Traffic analysis can be performed using a variety of techniques, such as network flow analysis, or protocol analysis.
  • Active Attacks: Active attacks refer to types of attacks that involve the attacker actively disrupting or altering system, network, or device activity. Active attacks are typically focused on causing damage or disruption, rather than gathering information or intelligence. Here, both the sender and receiver have no clue that their message/ data is modified by some third-party intruder. The message/ data transmitted doesn’t remain in its usual form and shows deviation from its usual behavior. This makes active attacks dangerous as there is no information provided of the attack happening in the communication process and the receiver is not aware that the data/ message received is not from the sender. Active attacks are further divided into four parts based on their behavior:
    • Masquerade: Masquerade is a type of attack in which the attacker pretends to be an authentic sender in order to gain unauthorized access to a system. This type of attack can involve the attacker using stolen or forged credentials, or manipulating authentication or authorization controls in some other way.
    • Replay: Replay is a type of active attack in which the attacker intercepts a transmitted message through a passive channel and then maliciously or fraudulently replays or delays it at a later time.
    • Modification of Message: Modification of Message involves the attacker modifying the transmitted message and making the final message received by the receiver look like it’s not safe or non-meaningful. This type of attack can be used to manipulate the content of the message or to disrupt the communication process.
    • Denial of service (DoS): Denial of Service attacks involve the attacker sending a large volume of traffic to a system, network, or device in an attempt to overwhelm it and make it unavailable to users.

2. Security Mechanism

The mechanism that is built to identify any breach of security or attack on the organization, is called a security mechanism. Security Mechanisms are also responsible for protecting a system, network, or device against unauthorized access, tampering, or other security threats.

  • Encipherment (Encryption): Encryption involves the use of algorithms to transform data into a form that can only be read by someone with the appropriate decryption key. Encryption can be used to protect data it is transmitted over a network, or to protect data when it is stored on a device.
  • Digital signature: Digital Signature is a security mechanism that involves the use of cryptographic techniques to create a unique, verifiable identifier for a digital document or message, which can be used to ensure the authenticity and integrity of the document or message.
  • Traffic padding: Traffic Padding is a technique used to add extra data to a network traffic stream in an attempt to obscure the true content of the traffic and make it more difficult to analyze.
  • Routing control: Routing Control allows the selection of specific physically secure routes for specific data transmission and enables routing changes, particularly when a gap in security is suspected.

3. Security Services

Security services refer to the different services available for maintaining the security and safety of an organization. They help in preventing any potential risks to security. Security services are divided into 5 types:

  • Authentication: Authentication is the process of verifying the identity of a user or device in order to grant or deny access to a system or device.
  • Access control: Access Control involves the use of policies and procedures to determine who is allowed to access specific resources within a system.
  • Data Confidentiality: Data Confidentiality is responsible for the protection of information from being accessed or disclosed to unauthorized parties.
  • Data integrity: Data Integrity is a security mechanism that involves the use of techniques to ensure that data has not been tampered with or altered in any way during transmission or storage.
  • Non- repudiation: Non-repudiation involves the use of techniques to create a verifiable record of the origin and transmission of a message, which can be used to prevent the sender from denying that they sent the message.

Benefits of OSI Security Architecture

  • Providing Security: OSI Architecture in an organization provides the needed security and safety, preventing potential threats and risks.
  • Organising Task: The OSI architecture makes it easy for managers to build a security model for the organization based on strong security principles.
  • Meets International Standards: Security services are defined and recognized internationally meeting international standards.
  • Interoperability: By dividing network functions into multiple levels, the OSI model makes it easier for different hardware and software components to work together.
  • Scalability: The layered method makes networks scalable. New technologies and protocols can be seamlessly added without interrupting the overall system.
  • Flexibility: Each layer can evolve separately, providing flexibility for technology and application changes.

Conclusion

In conclusion, the OSI Security Architecture provides an important framework for protecting organizational data and communication activities. Security measures are classified into attacks, mechanisms, and services, providing an integrated approach to assuring confidentiality, integrity, and availability. This internationally recognized architecture not only improves security, but also encourages task organization, interoperability, scalability, and flexibility in network contexts.

Frequently Asked Questions on OSI Security Architecture – FAQs

What is the OSI model in cyber security?

The OSI reference model describes how data is sent and received over a network. This model breaks down data transmission into seven layers. Each layer is responsible for completing certain data transmission and reception responsibilities.

How does the OSI model enhance network security?

The OSI model improves network security by dividing network communication into layers, each with itssecurity protocols and procedures. This layer-based approach enables customized security methods, making it easier to address vulnerabilities and threats at the appropriate level.

What are the elements of security architecture?

  • Risk Management
  • Access Control
  • Encryption
  • Authentication
  • Intrusion Detection and Prevention


R

riarawal99

OSI Security Architecture - GeeksforGeeks (2)

Improve

Previous Article

Cyber Security Tutorial

Next Article

Active and Passive attacks in Information Security

Please Login to comment...

OSI Security Architecture - GeeksforGeeks (2024)
Top Articles
8 Types of Insurance You Can't Go Without
????*WHY WE'LL NEVER BECOME RIPPLE/XRP MILLIONAIRES | THIS WILL SHOCK YOU*????
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Dmv In Anoka
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Golda Nolan II

Last Updated:

Views: 6832

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Golda Nolan II

Birthday: 1998-05-14

Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

Phone: +522993866487

Job: Sales Executive

Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.