Selasa, 14 April 2015

Summary of Security Services



1.       Authentication
Ø  Peer entity authentication
This service is provided for use at the establishment of, or at times during, the data transfer phase of a connection to confirm the identities of one or more of the entities connected to one or more of the other entities.
Ø  Data origin authentication
The data origin authentication service provides the corroboration of the source of a data unit.

2.       Access control
This protection service may be applied to various types of access to a resource (e.g., the use of a communications resource; the reading, the writing, or the deletion of an information resource; the execution of a processing resource) or to all accesses to a resource.

3.       Data confidentiality
Ø  Connection confidentiality
This service provides for the confidentiality of all (N)-user-data on an (N)-connection.
Ø  Connectionless confidentiality
This service provides for the confidentiality of all (N)-user-data in a single connectionless (N)-SDU (System Data Unit).
Ø  Selective field confidentiality
This service provides for the confidentiality of selected fields within the (N)-user-data on an (N)-connection or in a single connectionless (N)-SDU.
Ø  Traffic flow confidentiality
This service provides for the protection of the information which might be derived from observation of traffic flows.

4.       Data integrity
Ø  Connection integrity with recovery
This service provides for the integrity of all (N)-user-data on an (N)-connection and detects any modification, insertion, deletion or replay of any data within an entire SDU sequence (with recovery attempted).
Ø  Connection integrity without recovery
Ø  Selective field connection integrity
This service provides for the integrity of selected fields within the (N)-user data of an (N)-SDU transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed.
Ø  Connectionless integrity
This service provides for the integrity of a single connectionless SDU and may take the form of determination of whether a received SDU has been modified.
Ø  Selective field connectionless integrity
This service provides for the integrity of selected fields within a single connectionless SDU and takes the form of determination of whether the selected fields have been modified.

5.       Non-repudiation
Ø  Non-repudiation with proof of origin
The recipient of data is provided with proof of the origin of data.
Ø  Non-repudiation with proof of delivery
The sender of data is provided with proof of delivery of data.


Source : Ebook of Recommendation X.800 page 8-10

Tidak ada komentar:

Posting Komentar