Share to: share facebook share twitter share wa share telegram print page

Security service (telecommunication)

Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers[1] as defined by ITU-T X.800 Recommendation.
X.800 and ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture)[2] are technically aligned. This model is widely recognized [3] [4]

A more general definition is in CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America:[5]

A capability that supports one, or more, of the security requirements (Confidentiality, Integrity, Availability). Examples of security services are key management, access control, and authentication.

Another authoritative definition is in W3C Web service Glossary [6] adopted by NIST SP 800-95:[7]

A processing or communication service that is provided by a system to give a specific kind of protection to resources, where said resources may reside with said system or reside with other systems, for example, an authentication service or a PKI-based document attribution and authentication service. A security service is a superset of AAA services. Security services typically implement portions of security policies and are implemented via security mechanisms.

Basic security terminology

Information security and Computer security are disciplines that are dealing with the requirements of Confidentiality, Integrity, Availability, the so-called CIA Triad, of information asset of an organization (company or agency) or the information managed by computers respectively.

There are threats that can attack the resources (information or devices to manage it) exploiting one or more vulnerabilities. The resources can be protected by one or more countermeasures or security controls.[8]

So security services implement part of the countermeasures, trying to achieve the security requirements of an organization.[3][9]

Basic OSI terminology

In order to let different devices (computers, routers, cellular phones) to communicate data in a standardized way, communication protocols had been defined.

The ITU-T organization published a large set of protocols. The general architecture of these protocols is defined in recommendation X.200.[10]

The different means (air, cables) and ways (protocols and protocol stacks) to communicate are called a communication network.

Security requirements are applicable to the information sent over the network. The discipline dealing with security over a network is called Network security.[11]

The X.800 Recommendation:[1]

  1. provides a general description of security services and related mechanisms, which may be provided by the Reference Model; and
  2. defines the positions within the Reference Model where the services and mechanisms may be provided.

This Recommendation extends the field of application of Recommendation X.200, to cover secure communications between open systems.

According to X.200 Recommendation, in the so-called OSI Reference model there are 7 layers, each one is generically called N layer. The N+1 entity ask for transmission services to the N entity.[10]

At each level two entities (N-entity) interact by means of the (N) protocol by transmitting Protocol Data Units (PDU). Service Data Unit (SDU) is a specific unit of data that has been passed down from an OSI layer, to a lower layer, and has not yet been encapsulated into a PDU, by the lower layer. It is a set of data that is sent by a user of the services of a given layer, and is transmitted semantically unchanged to a peer service user . The PDU at any given layer, layer 'n', is the SDU of the layer below, layer 'n-1'. In effect the SDU is the 'payload' of a given PDU. That is, the process of changing a SDU to a PDU, consists of an encapsulation process, performed by the lower layer. All the data contained in the SDU becomes encapsulated within the PDU. The layer n-1 adds headers or footers, or both, to the SDU, transforming it into a PDU of layer n-1. The added headers or footers are part of the process used to make it possible to get data from a source to a destination.[10]

OSI security services description

The following are considered to be the security services which can be provided optionally within the framework of the OSI Reference Model. The authentication services require authentication information comprising locally stored information and data that is transferred (credentials) to facilitate the authentication:[1][4]

Authentication
These services provide for the authentication of a communicating peer entity and the source of data as described below.
Peer entity authentication
This service, when provided by the (N)-layer, provides corroboration to the (N + 1)-entity that the peer entity is the claimed (N + 1)-entity.
Data origin authentication
This service, when provided by the (N)-layer, provides corroboration to an (N + 1)-entity that the source of the data is the claimed peer (N + 1)-entity.
Access control
This service provides protection against unauthorized use of resources accessible via OSI. These may be OSI or non-OSI resources accessed via OSI protocols. This protection service may be applied to various types of access to a resource (e.g., the use of a communications resource; the reading, the writing, or the deletion of an information resource; the execution of a processing resource) or to all accesses to a resource.
Data confidentiality
These services provide for the protection of data from unauthorized disclosure as described below
Connection confidentiality
This service provides for the confidentiality of all (N)-user-data on an (N)-connection
Connectionless confidentiality
This service provides for the confidentiality of all (N)-user-data in a single connectionless (N)-SDU
Selective field confidentiality
This service provides for the confidentiality of selected fields within the (N)-user-data on an (N)-connection or in a single connectionless (N)-SDU.
Traffic flow confidentiality
This service provides for the protection of the information which might be derived from observation of traffic flows.
Data integrity
These services counter active threats and may take one of the forms described below.
Connection integrity with recovery
This service provides for the integrity of all (N)-user-data on an (N)-connection and detects any modification, insertion, deletion or replay of any data within an entire SDU sequence (with recovery attempted).
Connection integrity without recovery
As for the previous one but with no recovery attempted.
Selective field connection integrity
This service provides for the integrity of selected fields within the (N)-user data of an (N)-SDU transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed.
Connectionless integrity
This service, when provided by the (N)-layer, provides integrity assurance to the requesting (N + 1)-entity. This service provides for the integrity of a single connectionless SDU and may take the form of determination of whether a received SDU has been modified. Additionally, a limited form of detection of replay may be provided.
Selective field connectionless integrity
This service provides for the integrity of selected fields within a single connectionless SDU and takes the form of determination of whether the selected fields have been modified.
Non-repudiation
This service may take one or both of two forms.
Non-repudiation with proof of origin
The recipient of data is provided with proof of the origin of data. This will protect against any attempt by the sender to falsely deny sending the data or its contents.
Non-repudiation with proof of delivery
The sender of data is provided with proof of delivery of data. This will protect against any subsequent attempt by the recipient to falsely deny receiving the data or its contents.

Specific security mechanisms

The security services may be provided by means of security mechanism:[1][3][4]

The table1/X.800 shows the relationships between services and mechanisms

Illustration of relationship of security services and mechanisms
Service Mechanism
Encipherment Digital signature Access control Data integrity Authentication exchange Traffic padding Routing control Notarization
Peer entity authentication Y Y · · Y · · ·
Data origin authentication Y Y · · · · · ·
Access control service · · Y · · · · ·
Connection confidentiality Y . · · · · Y ·
Connectionless confidentiality Y · · · · · Y ·
Selective field confidentiality Y · · · · · · ·
Traffic flow confidentiality Y · · · · Y Y ·
Connection Integrity with recovery Y · · Y · · · ·
Connection integritywithout recovery Y · · Y · · · ·
Selective field connection integrity Y · · Y · · · ·
Connectionless integrity Y Y · Y · · · ·
Selective field connectionless integrity Y Y · Y · · · ·
Non-repudiation. Origin · Y · Y · · · Y
Non-repudiation. Delivery Y · Y · · · Y

Some of them can be applied to connection oriented protocols, other to connectionless protocols or both.

The table 2/X.800 illustrates the relationship of security services and layers:[4]

Illustration of the relationship of security services and layers
Service Layer
1 2 3 4 5 6 7*
Peer entity authentication · · Y Y · · Y
Data origin authentication · · Y Y · · Y
Access control service · · Y Y · · Y
Connection confidentiality Y Y Y Y · Y Y
Connectionless confidentiality · Y Y Y · Y Y
Selective field confidentiality · · · · · Y Y
Traffic flow confidentiality Y · Y · · · Y
Connection Integrity with recovery · · · Y · · Y
Connection integrity without recovery · · Y Y · · Y
Selective field connection integrity · · · · · · Y
Connectionless integrity · · Y Y · · Y
Selective field connectionless integrity · · · · · · Y
Non-repudiation Origin · · · · · · Y
Non-repudiation. Delivery · · · · · · Y

Managed security service

Managed security service (MSS) are network security services that have been outsourced to a service provider.

See also

References

  1. ^ a b c d X.800 : Security architecture for Open Systems Interconnection for CCITT applications
  2. ^ ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture)
  3. ^ a b c William Stallings Crittografia e sicurezza delle reti Seconda edizione ISBN 88-386-6377-7 Traduzione Italiana a cura di Luca Salgarelli di Cryptography and Network security 4 edition Pearson 2006
  4. ^ a b c d Securing information and communications systems: principles, technologies, and applications Steven Furnell, Sokratis Katsikas, Javier Lopez, Artech House, 2008 - 362 pages
  5. ^ CNSS Instruction No. 4009 dated 26 April 2010
  6. ^ W3C Web Services Glossary
  7. ^ NIST Special Publication 800-95 Guide to Secure Web Services
  8. ^ Internet Engineering Task Force RFC 2828 Internet Security Glossary
  9. ^ Network security essentials: applications and standards, William Stallings, Prentice Hall, 2007 - 413 pages
  10. ^ a b c X.200 : Information technology - Open Systems Interconnection - Basic Reference Model: The basic model
  11. ^ Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for Network Security Attacks". Lecture Notes in Computer Science 3285: 317–323

Read other articles:

Part of a series onTransport in Bangladesh Modes Rail Lines Station Trains Roads Boat Aviation History Airlines Air Astra Biman Bangladesh Novoair US-Bangla Airlines South Asian Airlines Bismillah Airlines Easy Fly Express SkyAir Airports Barisal Patuakhali Chittagong Comilla Cox's Bazar Dhaka Tangail Khulna Jessore Rajshahi Bogra Saidpur Lalmonirhat Thakurgaon Sylhet Shamshernagar Authorities Ministry of Road Transport and Bridges Department of Government Transport Bangladesh Inland Water Tr...

Barclays Bank plc v O’BrienCourtHouse of LordsDecided21 October 1993Citation(s)[1993] UKHL 6, [1993] 4 All ER 417Case historyPrior action(s)Barclays Bank Plc v O 'Brien [1993] QB 109, [1992] EWCA Civ 11Court membershipJudge(s) sittingLord Browne-Wilkinson, Lord Templeman, Lord Woolf, Lord Slynne of Hadley, Lord LowryCase opinionsDecision byLord Browne-WilkinsonKeywordsUndue influence Barclays Bank plc v O’Brien [1993] UKHL 6 (21 October 1993) is an English contract law cas...

County in New York, United States Not to be confused with Ontario, New York. 42°51′N 77°17′W / 42.85°N 77.29°W / 42.85; -77.29 County in New YorkOntario CountyCountyOntario County Courthouse in Canandaigua, 2014 FlagSealLocation within the U.S. state of New YorkNew York's location within the U.S.Coordinates: 42°51′N 77°17′W / 42.85°N 77.29°W / 42.85; -77.29Country United StatesState New YorkFounded1789Named forLake Onta...

Este artigo não cita fontes confiáveis. Ajude a inserir referências. Conteúdo não verificável pode ser removido.—Encontre fontes: ABW  • CAPES  • Google (N • L • A) (Setembro de 2021) A Navegação na Antiguidade foi impulsionada por povos antigos que se lançaram aos mares, entre eles os viquingues, Gregos e Fenícios. A maioria dos povos antigos usavam navios de guerra em grandes batalhas, como os Gregos nos 500 anos de g...

See also: List of fish dishes Plateau de fruits de mer (French 'seafood platter') is a seafood dish of raw and cooked shellfish served cold on a platter, usually on a bed of ice. Seafood on a platter This is a list of notable seafood dishes. Seafood dishes are food dishes which use seafood (fish, shellfish or seaweed) as primary ingredients, and are ready to be served or eaten with any needed preparation or cooking completed. Many fish or seafood dishes have a specific name (cioppino), while ...

Departamento de Policía de la Autoridad Portuaria de Nueva York y Nueva Jersey Port Authority of New York and New Jersey Police Department Parche del Departamento de Policía de la Autoridad Portuaria de Nueva York y Nueva JerseyLocalizaciónPaís Estados UnidosInformación generalSigla PAPDJurisdicción Nueva York y Nueva JerseyTipo Fuerza policialSede Jersey City, Nueva JerseySistema Organización gubernamentalOrganizaciónMinistros Michael A. FedorkoComposición Autoridad Portuaria de Nue...

British multinational low-cost airline groupEasy Jet redirects here. For other uses, see Easy Jet (disambiguation). EasyJet plc IATA ICAO Callsign U2 EZY EASY Founded1995; 28 years ago (1995) by Sir Stelios Haji-IoannouOperating bases Belfast–International Birmingham Bristol Edinburgh Glasgow Liverpool London–Gatwick London–Luton Manchester Frequent-flyer programFlight ClubSubsidiariesEasyJet UKEasyJet EuropeEasyJet Switzerland (40%)EasyJet HolidaysFleet size333[1&...

1958 Maine gubernatorial election ← 1956 September 8, 1958 1960 (special) →   Nominee Clinton Clauson Horace Hildreth Party Democratic Republican Popular vote 145,673 134,572 Percentage 51.98% 48.02% County resultsClauson:      50–60%      60–70% Hildreth:      50–60%      60–70% Governor before election Edmund Muskie Democratic Elected Governor Clinton C...

Кубок Латвії 2022 Подробиці Дата проведення 6 травня — 19 жовтня 2022 Кількість учасників 54 Призові місця  Чемпіон Ауда (1-й раз) Віцечемпіон РФШ Статистика Зіграно матчів 46 Забито голів 217 (4.72 за матч) ← 2021 2023 → Кубок Латвії з футболу 2022 — 28-й розіграш кубкового футбо...

The Field Where I DiedEpisode The X-FilesNomor episodeMusim 4Episode 5SutradaraRob BowmanPenulisGlen MorganJames WongKode produksi4X05Tanggal siar3 November 1996Durasi44 menitBintang tamu Mitch Pileggi sebagai Walter Skinner Kristen Cloke sebagai Melissa Riedal-Ephesian Michael Dobson sebagai BATF Agent Michael Massee sebagai Vernon Ephesian Les Gallagher sebagai Attorney Dough Abrahams sebagai Harbaugh Donna White sebagai Therapist Anthony Harrison sebagai Agent Riggins Douglas Roy Dack...

В Википедии есть статьи о других людях с такой фамилией, см. Шендриков. Степан Никифорович Шендриков Дата рождения 1 августа 1885(1885-08-01) Место рождения станица Софийская, Семиреченская область Дата смерти не ранее 1947 Гражданство  Российская империя Род деятельност...

Bosnian singer This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: The article contains grammar and punctuation mistakes. Native English speaker's attention required. Please help improve this article if you can. (August 2021) (Learn how and when to remove this template message) This article's tone...

American TV series or program AttilaAlso known asAttila the HunWritten byRobert CochranDirected byDick LowryStarringGerard ButlerPowers BootheSimmone MackinnonReg RogersTim CurryAlice KrigeMusic byNick Glennie-SmithCountry of originUnited StatesLithuaniaOriginal languageEnglishProductionExecutive producersCaldecot ChubbSean DanielJames JacksProducersPaul LichtmanRobertas UrbonasCinematographySteven FierbergEditorTod FeuermanRunning time177 minutesProduction companiesAlphaville FilmsAttil...

Ministry of Health and Social AffairsSocialdepartementetLesser Coat of ArmsAgency overviewFormed1 July 1920 (1 July 1920)[1]JurisdictionSFS 1996:1515HeadquartersFredsgatan 8, StockholmMinisters responsibleJakob Forssmed, Head of the Ministry Minister for Social Affairs and Public Health Acko Ankarberg Johansson, Minister for Healthcare Anna Tenje, Minister for Older People and Social SecurityCamilla Waltersson Grönvall, Minister for Social Services Websitewww.government.se/gover...

Isabel Duquesa de WürttembergArquiduquesa da ÁustriaPrincesa da Hungria, Croácia e Boêmia Isabel de WürttembergRetrato por Johann Baptist von Lampi, 1785 Nascimento 21 de abril de 1767   Trzebiatów, Pomerânia Morte 18 de fevereiro de 1790 (22 anos)   Viena, Áustria Sepultado em Cripta Imperial, Viena, Áustria Nome completo Isabel Guilhermina Luísa Cônjuge Francisco da Áustria Descendência Arquiduquesa Luísa Isabel da Áustria Casa Württemberg (nascimento)Hab...

Japanese baseball player Baseball player GinjiAkaminai with the Tohoku Rakuten Golden EaglesTohoku Rakuten Golden Eagles – No. 33First basemanBorn: (1988-02-24) February 24, 1988 (age 35)Bats: LeftThrows: RightNPB debutJune 29, 2010, for the Tohoku Rakuten Golden EaglesNPB statistics (through April 5, 2022)Batting average.292Home runs28RBI446 Teams Tohoku Rakuten Golden Eagles (2006–2023) Career highlights and awards 2× NPB All-Star (2014, 2019) 2× Best Nine Awar...

San Antonio-class amphibious transport dock For other ships with the same name, see USS Harrisburg. USS Harrisburg (LPD-30) Harrisburg's sister ships USS San Antonio and USS New York History United States NameHarrisburg NamesakeHarrisburg Awarded26 March 2019 BuilderIngalls Shipbuilding Laid down28 January 2022[1][2] Sponsored byAlexandra Curry IdentificationPennant number: LPD-30 StatusUnder construction General characteristics Class and typeSan Antonio-class am...

Brazilian beach volleyball player Maria AntonelliPersonal informationFull nameMaria Elisa Mendes Ticon AntonelliNationalityBrazilianBorn (1984-02-25) 25 February 1984 (age 39)Resende, RJ, BrazilHometownRio de Janeiro, BrazilHeight176 cm (5 ft 9 in)Beach volleyball informationCurrent teammate Teammate Juliana Silva Honours Women's beach volleyball Representing  Brazil World Championships 2015 The Hague Beach Maria Elisa Mendes Ticon Antonelli (born 25 February 198...

Annual freshwater yacht race in the United States Chicago Yacht Club Race to MackinacMackinac Island Harbor on June 29, 2009, at the end of the race.First held1898; 125 years ago (1898)Organizer Chicago Yacht ClubStartChicago, IllinoisFinishMackinac Island, MichiganLength333 mi (289 nmi; 536 km)Websitewww.cycracetomackinac.com The Chicago Yacht Club Race to Mackinac is a 333-mile (289 nmi; 536 km) annual yacht race starting in Lake Michigan...

Cathédrale Saint-Bénigne de Dijon Présentation Culte Catholique romain Dédicataire Saint Bénigne Type Cathédrale Rattachement Archidiocèse de Dijon Début de la construction 1280 Fin des travaux 1393 Style dominant GothiqueRoman (crypte) Protection  Classée MH (1846, 1862) Patrimoine mondial (2015, Climats du vignoble de Bourgogne) Site web Paroisse Saint-Bénigne de Dijon – Cathédrale de Dijon Géographie Pays France Région Bourgogne-Franche-Comté Département Cô...

Kembali kehalaman sebelumnya