Partial preview of the text
Download Computer network and security and more Study notes Computer Security in PDF only on Docsity!
perhaps ® following at a) ' cwanition | onsing of Comm NY wlio ) by a system to give a specific kind vf prote : - ~ yetdm plemented eecurity services implement security policies * by security mechanisms. | " -¥ 800 divides these services into nec ices (Table). We look at ea specific service Table : Security Services a 1. Authen tication tity is the one that 1t| ) communicating en The assurance that th claims to be. ' Peer Entity Authentication | Used in association with a logical connection to provide confid in the identity of the entities chnnected | Data Origin opamp In a connectionless transfer,|provides assurance that the source | of received data is as claim od i 2. Actess Control revention of unauthorized use of are ence | ag a EE hn ek ae ra - © The prev source (i.e., this service | control who can have access to a resource, under what conditions | an occur, and what those accessing the resource are ese Y or) yy : i Saigt hae" . a \ eyes - 8. Data Confidentiality i s hs ug 7 ae * ees Boi aEaG ee of data from unauth orized disclosure. fer A ae. a Py | o | : ‘ ae ity z : 4 = P Pam . . t, * . Faia : ' ! | oF a PLA x cA ® a P : e on oe oo , rig ee , ea gtr ng: 9 , ys, i : 7 a it a a r ; La! *y fis " o§ r ‘ ro. oe se atiality | gp | ea " q : ¥ iz ty + ry 4 7] 3 4 a : ; x * a ae ot bi 4 a ae ‘eit y-cah F ar. *a i ee ‘ rai 65 he ‘ a ss 5 , es : - ¥ 4 2 o> 7 3 - & 7 i ; eee ee VOL BA P 4 ee a ¥ ; 4 : i 4 i. i ee 4 a. gooey? —— va . ai f 4s = t , ala 4 t te eels ce 2. yz A? fo) ki ae