CRYPTOGRAPHY AND NETWORK SECURITY Tutorial

Security approaches


i.Trusted Systems:

It is a computer system that can be trusted to a specified extent to enforce a specified security policy.We are showing interest in military.In this often use the term reference monitor. Expectations from the Reference monitor is  It should be tampered-proof  It should always be invoked  It should be small enough so that it can be independently tested. In 1983,They are introduced (Trusted Computer System Evaluation Criteria(TCSEC)-Issued by National Security Agency set by evaluation classes). ->To reduce size of trusted computing base(TCB)-It is a combination of software,hardware,firmware responsible for enforcing the system`s security policy.

ii.Security Models:

The Various methods of security models are implemented below.  No Security:The approach could be implemented no security at all.  Security through obscurity:it is secure by not revealing existence and contents to any person.  Host Security:The security is provided on each and every host separately.it is a safe approach but the trouble is that it cannot scale well.  Network Security:It is mainly focusedis to control network access to various hosts and their services rather than individual host security.

iii.Security Management Principles:

    It contains 4 key aspects.
  •  Affordability:Cost and effort in security Implementation
  •  Functionality:what mechanisms are used for security implementation.
  •  Cultural Issues:policy well with people expectations working styles and beliefs
  •  Legality:it meets the legal requirements or not.
    • Explanation,outline,communications,accountability,expectations and periodic reviews