Security Mechanisms

Security Mechanisms is basically used to implement security services. They included(X.800):

Specific Security Mechanisms

May be incorporated into the appropriate protocol layer in order to provide some of the OSI security services.

Specific Security Mechanism are as follows

  1. Encipherment
    • Algorithms based on mathematics are used to convert data into a form that is not easily comprehensible.
    • The conversion and recovery of data depends on these algorithm and also on encryption keys.
  2. Digital Signature
    • Cryptographic alteration of data allows receiver of the message to prove the source and integrity of message and guard against counterfeit attacks.
  3. Access Control
    • Kinds of mechanism which determines who should be able to access what resources.
  4. Data Integrity
    • Kinds of mechanism used to maintain the originality of data or to keep data intact till it reaches destination.
  5. Authentication Exchange
    • Kinds of mechanisms used to ensure originality of user by means of information exchange.
  6. Traffic Padding
    • Appending of data bits into gaps of a data flow to prevent traffic analysis attempts.
  7. Routing Control
    • Allows selecting secure route for confident data and also enables routing modifications when violation to security suspected.
  8. Notarization
    • To guarantee particular features of data exchange, trusted third party is used.

Pervasive Security Mechanism

Mechanism that are specific to any particular OSI security service or protocol layer.

Pervasive security mechanisms are as follows:

  1. Trusted Functionality
    • It is appeared to be correct regarding some criteria.
  2. Security Label
    • The indicator to s resource which specifies security attributes of this resources.
  3. Event Detection
    • Discovering security related events.
  4. Security Audit Trail
    • A security audit to review and observe system activities and records is performed on collected data.
  5. Security Recovery
    • Deals with various request sent by other mechanisms like function management, event performance etc. and takes necessary recovery actions.

Was this article helpful?
YesNo

Leave a Comment