SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
OSI SECURITY ARCHITECTURE
K.KAMALESH
23MCA21
INTRODUCTION TO OSI SECURITY ARCHITECTURE :
● The security of an organization is the greatest concern of the people working at the organization.
Safety and security are the pillars of cyber technology.
● It is hard to imagine the cyber world without thinking about security. The architecture of security is
thus a very important aspect of the organization.
● The OSI (Open Systems Interconnection) Security Architecture defines a systematic approach to
providing security at each layer.
● It defines security services and security mechanisms that can be used at each of the seven
layers of the OSI model to provide security for data transmitted over a network.
● These security services and mechanisms help to ensure the confidentiality, integrity, and
availability of the data. OSI architecture is internationally acceptable as it lays the flow of
providing safety in an organization.
SECURITY ARCHITECTURE:
Security Attack:
● A security attack is an attempt by a person or entity to gain unauthorized access to disrupt or
compromise the security of a system, network, or device.
● These are defined as the actions that put at risk an organization’s safety.
● They are further classified into 2 sub-categories:
● Passive Attack
● Active Attack
Passive Attack:
● Attacks in which a third-party intruder tries to access the message/ content/ data being shared by the sender
and receiver by keeping a close watch on the transmission or eave-dropping the transmission is called
Passive Attacks.
● These types of attacks involve the attacker observing or monitoring system, network, or device activity
without actively disrupting or altering it. Passive attacks are typically focused on gathering information or
intelligence, rather than causing damage or disruption.
● Here, both the sender and receiver have no clue that their message/ data is accessible to some third-party
intruder. The message/ data transmitted remains in its usual form without any deviation from its usual
behavior. This makes passive attacks very risky as there is no information provided about the attack
happening in the communication process.
Active Attack:
● Active attacks refer to types of attacks that involve the attacker actively disrupting or altering system,
network, or device activity. Active attacks are typically focused on causing damage or disruption, rather than
gathering information or intelligence.
● Here, both the sender and receiver have no clue that their message/ data is modified by some third-party
intruder. The message/ data transmitted doesn’t remain in its usual form and shows deviation from its usual
behavior.
Masquerade
● It is a type of attack in which the attacker pretends to be an authentic sender in order to gain unauthorized
access to a system. This type of attack can involve the attacker using stolen or forged credentials, or
manipulating authentication or authorization controls in some other way.
Replay:
● It is a type of active attack in which the attacker intercepts a transmitted message through a passive channel
and then maliciously or fraudulently replays or delays it at a later time.
Modification of Message :
● It involves the attacker modifying the transmitted message and making the final message received by the
receiver look like it’s not safe or non-meaningful. This type of attack can be used to manipulate the content
of the message or to disrupt the communication process.
Denial of service (DoS) :
● This attacks involve the attacker sending a large volume of traffic to a system, network, or device in an
attempt to overwhelm it and make it unavailable to legitimate users.
SECURITY MECHANISM :
● The mechanism that is built to identify any breach of security or attack on the organization, is called a
security mechanism. Security Mechanisms are also responsible for protecting a system, network, or
device against unauthorized access, tampering, or other security threats.
● Security mechanisms can be implemented at various levels within a system or network and can be used to
provide different types of security, such as confidentiality, integrity, or availability.
● Encipherment
● Digital signature
● Traffic padding
● Routing control
Enciphermen:
● Encipherment involves the use of algorithms to transform data into a form that can only be
read by someone with the appropriate decryption key. Encryption can be used to protect
data it is transmitted over a network, or to protect data when it is stored on a device.
Digital signature :
● Digital signature is a security mechanism that involves the use of cryptographic techniques
to create a unique, verifiable identifier for a digital document or message, which can be used
to ensure the authenticity and integrity of the document or message.
Traffic padding:
● Traffic padding is a technique used to add extra data to a network traffic stream in an
attempt to obscure the true content of the traffic and make it more difficult to analyze.
Routing control :
● Routing control allows the selection of specific physically secure routes for specific data
transmission and enables routing changes, particularly when a gap in security is suspected.
SECURITY SERVICES :
● Security services refer to the different services available for maintaining the security and
safety of an organization.
● They help in preventing any potential risks to security. Security services are divided into 5
type
● Authentication
● Access control
● Data integrity
Authentication:
● Authentication is the process of verifying the identity of a user or device in order to grant or deny acces
to a system or device.
Access control:
● Access control involvesthe use of policies and procedures to determine who is allowed to access spec
resources within a system.
Data Confidentiality:
● Data Confidentiality is responsible for the protection of information from being accessed or disclosed t
unauthorized parties.
Data integrity:
● Data integrity is a security mechanism that involves the use of techniques to ensure that data has not
been tampered with or altered in any way during transmission or storage.
Non- repudiation:
● Non- repudiation involves the use of techniques to create a verifiable record of the origin and
transmission of a message, which can be used to prevent the sender from denying that they sent the
message.
Benefits of OSI Architecture:
1. Providing Security:
● OSI Architecture in an organization provides the needed security and safety, preventing potential threats
and risks.
● Managers can easily take care of the security and there is hassle-free security maintenance done through
OSI Architecture.
2. Organising Task:
● The OSI architecture makes it easy for managers to build a security model for the organization based on
strong security principles.
● Managers get the opportunity to organize tasks in an organization effectively.
3. Meets International Standards:
● Security services are defined and recognized internationally meeting international standards.
● The standard definition of requirements defined using OSI Architecture is globally accepted.
Thanks you 😊

More Related Content

PDF
Network security - OSI Security Architecture
PPT
PUBLIC KEY ENCRYPTION
PPT
authentication.ppt
PPT
Message Authentication
PPTX
Asymmetric Cryptography.pptx
 
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
Rsa Crptosystem
Network security - OSI Security Architecture
PUBLIC KEY ENCRYPTION
authentication.ppt
Message Authentication
Asymmetric Cryptography.pptx
 
What is Asymmetric Encryption? Understand with Simple Examples
Rsa Crptosystem

What's hot (20)

PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Topic1 substitution transposition-techniques
PPTX
Public Key Cryptography
PDF
symmetric key encryption algorithms
PPT
Message authentication and hash function
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Security Mechanisms
PDF
Web Security
PPTX
Introduction to Cryptography
PPTX
Symmetric and asymmetric key
PPTX
Cryptography and Information Security
PPTX
Security services and mechanisms
PDF
Asymmetric Cryptography
PPT
Message authentication
 
PPTX
Computer security concepts
PPTX
Key management
PPTX
Principles of public key cryptography and its Uses
PPTX
Substitution cipher and Its Cryptanalysis
PPTX
Double DES & Triple DES
Chapter 1 Introduction of Cryptography and Network security
Topic1 substitution transposition-techniques
Public Key Cryptography
symmetric key encryption algorithms
Message authentication and hash function
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Security Mechanisms
Web Security
Introduction to Cryptography
Symmetric and asymmetric key
Cryptography and Information Security
Security services and mechanisms
Asymmetric Cryptography
Message authentication
 
Computer security concepts
Key management
Principles of public key cryptography and its Uses
Substitution cipher and Its Cryptanalysis
Double DES & Triple DES
Ad

Similar to Osi security architecture in network.pptx (20)

PPTX
2-OSI SECURITY ARCHITECTURE F1.pptxfdddss
PPTX
2-OSI SECURITY ARCHITECTURE F1-1.pptxhhhh
PPT
Module-1.ppt cryptography and network security
PDF
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
PDF
The Road Network security
PPT
Network and Information Security unit 1.ppt
PPT
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
PPT
ch01.ppt
PDF
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
PDF
Lec 01.pdf
PPTX
chapter 1 INTROoooooooooooooooooooo.pptx
PPTX
Introduction of network security
PPT
PPT
Network Security 1st Lecture
PPT
Ch01
PPTX
CS8792 - Cryptography and Network Security
PPTX
Cyber Security Part-I.pptx
PDF
Cryptography and Network Security ppt . pdf
PPTX
X.800 defines a security service iyew gt
PPTX
Basics -1.pptx kiy fdest xfderwe dgdar d
2-OSI SECURITY ARCHITECTURE F1.pptxfdddss
2-OSI SECURITY ARCHITECTURE F1-1.pptxhhhh
Module-1.ppt cryptography and network security
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
The Road Network security
Network and Information Security unit 1.ppt
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
ch01.ppt
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
Lec 01.pdf
chapter 1 INTROoooooooooooooooooooo.pptx
Introduction of network security
Network Security 1st Lecture
Ch01
CS8792 - Cryptography and Network Security
Cyber Security Part-I.pptx
Cryptography and Network Security ppt . pdf
X.800 defines a security service iyew gt
Basics -1.pptx kiy fdest xfderwe dgdar d
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Website Design Services for Small Businesses.pdf
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Cost to Outsource Software Development in 2025
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Website Design Services for Small Businesses.pdf
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
AutoCAD Professional Crack 2025 With License Key
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Advanced SystemCare Ultimate Crack + Portable (2025)
Cost to Outsource Software Development in 2025
Odoo Companies in India – Driving Business Transformation.pdf
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Weekly report ppt - harsh dattuprasad patel.pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
17 Powerful Integrations Your Next-Gen MLM Software Needs
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Computer Software and OS of computer science of grade 11.pptx
Designing Intelligence for the Shop Floor.pdf
Operating system designcfffgfgggggggvggggggggg

Osi security architecture in network.pptx

  • 2. INTRODUCTION TO OSI SECURITY ARCHITECTURE : ● The security of an organization is the greatest concern of the people working at the organization. Safety and security are the pillars of cyber technology. ● It is hard to imagine the cyber world without thinking about security. The architecture of security is thus a very important aspect of the organization. ● The OSI (Open Systems Interconnection) Security Architecture defines a systematic approach to providing security at each layer. ● It defines security services and security mechanisms that can be used at each of the seven layers of the OSI model to provide security for data transmitted over a network. ● These security services and mechanisms help to ensure the confidentiality, integrity, and availability of the data. OSI architecture is internationally acceptable as it lays the flow of providing safety in an organization.
  • 4. Security Attack: ● A security attack is an attempt by a person or entity to gain unauthorized access to disrupt or compromise the security of a system, network, or device. ● These are defined as the actions that put at risk an organization’s safety. ● They are further classified into 2 sub-categories: ● Passive Attack ● Active Attack
  • 5. Passive Attack: ● Attacks in which a third-party intruder tries to access the message/ content/ data being shared by the sender and receiver by keeping a close watch on the transmission or eave-dropping the transmission is called Passive Attacks. ● These types of attacks involve the attacker observing or monitoring system, network, or device activity without actively disrupting or altering it. Passive attacks are typically focused on gathering information or intelligence, rather than causing damage or disruption. ● Here, both the sender and receiver have no clue that their message/ data is accessible to some third-party intruder. The message/ data transmitted remains in its usual form without any deviation from its usual behavior. This makes passive attacks very risky as there is no information provided about the attack happening in the communication process.
  • 6. Active Attack: ● Active attacks refer to types of attacks that involve the attacker actively disrupting or altering system, network, or device activity. Active attacks are typically focused on causing damage or disruption, rather than gathering information or intelligence. ● Here, both the sender and receiver have no clue that their message/ data is modified by some third-party intruder. The message/ data transmitted doesn’t remain in its usual form and shows deviation from its usual behavior. Masquerade ● It is a type of attack in which the attacker pretends to be an authentic sender in order to gain unauthorized access to a system. This type of attack can involve the attacker using stolen or forged credentials, or manipulating authentication or authorization controls in some other way. Replay: ● It is a type of active attack in which the attacker intercepts a transmitted message through a passive channel and then maliciously or fraudulently replays or delays it at a later time. Modification of Message : ● It involves the attacker modifying the transmitted message and making the final message received by the receiver look like it’s not safe or non-meaningful. This type of attack can be used to manipulate the content of the message or to disrupt the communication process. Denial of service (DoS) : ● This attacks involve the attacker sending a large volume of traffic to a system, network, or device in an attempt to overwhelm it and make it unavailable to legitimate users.
  • 7. SECURITY MECHANISM : ● The mechanism that is built to identify any breach of security or attack on the organization, is called a security mechanism. Security Mechanisms are also responsible for protecting a system, network, or device against unauthorized access, tampering, or other security threats. ● Security mechanisms can be implemented at various levels within a system or network and can be used to provide different types of security, such as confidentiality, integrity, or availability. ● Encipherment ● Digital signature ● Traffic padding ● Routing control
  • 8. Enciphermen: ● Encipherment involves the use of algorithms to transform data into a form that can only be read by someone with the appropriate decryption key. Encryption can be used to protect data it is transmitted over a network, or to protect data when it is stored on a device. Digital signature : ● Digital signature is a security mechanism that involves the use of cryptographic techniques to create a unique, verifiable identifier for a digital document or message, which can be used to ensure the authenticity and integrity of the document or message. Traffic padding: ● Traffic padding is a technique used to add extra data to a network traffic stream in an attempt to obscure the true content of the traffic and make it more difficult to analyze. Routing control : ● Routing control allows the selection of specific physically secure routes for specific data transmission and enables routing changes, particularly when a gap in security is suspected.
  • 9. SECURITY SERVICES : ● Security services refer to the different services available for maintaining the security and safety of an organization. ● They help in preventing any potential risks to security. Security services are divided into 5 type ● Authentication ● Access control ● Data integrity
  • 10. Authentication: ● Authentication is the process of verifying the identity of a user or device in order to grant or deny acces to a system or device. Access control: ● Access control involvesthe use of policies and procedures to determine who is allowed to access spec resources within a system. Data Confidentiality: ● Data Confidentiality is responsible for the protection of information from being accessed or disclosed t unauthorized parties. Data integrity: ● Data integrity is a security mechanism that involves the use of techniques to ensure that data has not been tampered with or altered in any way during transmission or storage. Non- repudiation: ● Non- repudiation involves the use of techniques to create a verifiable record of the origin and transmission of a message, which can be used to prevent the sender from denying that they sent the message.
  • 11. Benefits of OSI Architecture: 1. Providing Security: ● OSI Architecture in an organization provides the needed security and safety, preventing potential threats and risks. ● Managers can easily take care of the security and there is hassle-free security maintenance done through OSI Architecture. 2. Organising Task: ● The OSI architecture makes it easy for managers to build a security model for the organization based on strong security principles. ● Managers get the opportunity to organize tasks in an organization effectively. 3. Meets International Standards: ● Security services are defined and recognized internationally meeting international standards. ● The standard definition of requirements defined using OSI Architecture is globally accepted.