Sie sind auf Seite 1von 18

L

E
W

O
C

E
M

presenting Security
MODELS IN
NETWORK
SECURITY

GROUP MEMBERS
NAMES
ANUPAMA BHARTI
DEEPTI
ZAINAB ANSARI

ROLL NO

37
32
21

IN TRO D U CTIO N
The Open Systems Interconnection

model (OSI), developed in 1983 by


the International Organization for
Standardization (ISO).
A computer Security Model is a
scheme for specifying & enforcing
security policies.
There are many aspects of a system
that can be secured,& security can
happen at various levels & to varying

W hy do w e need a N etw ork


Security M odel?
A well structured NSM will give the

security community a way to study,


implement, and maintain network
security that can be applied to any
network.
It can also be used to detect where
breaches have occurred so that an
attack can be mitigated or detected.
The NSM is beneficial to all types of
professionals.

Attributes ofSecurity M odels


Availability : It is the guarantee of

reliable access to information by


authorized peoples.
Integrity : It is the assurance that the
information is trustworthy &
accurate.
Confidentiality : It is a set of rules
that limits access to the information.

D iff
erent Approaches ofSecurity
M odels.

1.N o Security.
2.Security through
O bscurity.
3.H ost Security.
4.N etw ork Security.

N o Security
In this simplest case , the approach

could be a decision to implement no


security at all.

Security Through O bscurity


Security Through Obscurity (STO) is

the belief that a system of any sort


can be secure so long as nobody
outside of its implementation group
is allowed to find out anything about
its internal mechanisms.
Hiding account passwords in binary
files or scripts with the presumption
that "nobody will ever find it" is a
prime case of STO.

Its usefulness has declined in the computing

world with the rise of open systems, networking,


greater understanding of programming
techniques, as well as the increase in computing
power available to the average person.
Hence there is now a need is to to create

systems which attempt to be algorithmically


secure (Kerberos, Secure RPC), rather than just
philosophically secure. So long as your starting
criteria can be met, your system is LOGICALLY
secure.

Reallife security by obscurity?


The key to the front door is
stashed under a rock nearby,
or under the welcome mat,
or on top of a high railing.

H ost Security
A host security model can be very

suitable for small sites or sites with


extreme safety requirements.
Indeed, all sites must include a hostlevel security into their overall
security plans.
For example, even if you built a
firewall around your network and
internal systems, there will be some
systems exposed outside that must

The problem is that the security

model of the single host is simply not


profitable for all but small or single
locations; operate requires too many
restrictions and too many people.

N etw ork Security


A specialized field in computer

networking that involves securing a


computer network infrastructure.
Network security is typically handled
by a network administrator or
system administrator.
They implements the security policy,
network software and hardware
needed to protect a network.

A network security system typically

relies on layers of protection.


consists of multiple components
including networking monitoring and
security software in addition to
hardware and appliances.
All components work together to
increase the overall security of the
computer network.
Example : Firewall.

AN Y
Q U ESTIO N S
???

..TH
AN K
YO U

Das könnte Ihnen auch gefallen