L
E
W
O
C
E
M
presenting Security
MODELS IN
NETWORK
SECURITY
GROUP MEMBERS
NAMES
ANUPAMA BHARTI
DEEPTI
ZAINAB ANSARI
ROLL NO
37
32
21
IN TRO D U CTIO N
The Open Systems Interconnection
model (OSI), developed in 1983 by
the International Organization for
Standardization (ISO).
A computer Security Model is a
scheme for specifying & enforcing
security policies.
There are many aspects of a system
that can be secured,& security can
happen at various levels & to varying
W hy do w e need a N etw ork
Security M odel?
A well structured NSM will give the
security community a way to study,
implement, and maintain network
security that can be applied to any
network.
It can also be used to detect where
breaches have occurred so that an
attack can be mitigated or detected.
The NSM is beneficial to all types of
professionals.
Attributes ofSecurity M odels
Availability : It is the guarantee of
reliable access to information by
authorized peoples.
Integrity : It is the assurance that the
information is trustworthy &
accurate.
Confidentiality : It is a set of rules
that limits access to the information.
D iff
erent Approaches ofSecurity
M odels.
1.N o Security.
2.Security through
O bscurity.
3.H ost Security.
4.N etw ork Security.
N o Security
In this simplest case , the approach
could be a decision to implement no
security at all.
Security Through O bscurity
Security Through Obscurity (STO) is
the belief that a system of any sort
can be secure so long as nobody
outside of its implementation group
is allowed to find out anything about
its internal mechanisms.
Hiding account passwords in binary
files or scripts with the presumption
that "nobody will ever find it" is a
prime case of STO.
Its usefulness has declined in the computing
world with the rise of open systems, networking,
greater understanding of programming
techniques, as well as the increase in computing
power available to the average person.
Hence there is now a need is to to create
systems which attempt to be algorithmically
secure (Kerberos, Secure RPC), rather than just
philosophically secure. So long as your starting
criteria can be met, your system is LOGICALLY
secure.
Reallife security by obscurity?
The key to the front door is
stashed under a rock nearby,
or under the welcome mat,
or on top of a high railing.
H ost Security
A host security model can be very
suitable for small sites or sites with
extreme safety requirements.
Indeed, all sites must include a hostlevel security into their overall
security plans.
For example, even if you built a
firewall around your network and
internal systems, there will be some
systems exposed outside that must
The problem is that the security
model of the single host is simply not
profitable for all but small or single
locations; operate requires too many
restrictions and too many people.
N etw ork Security
A specialized field in computer
networking that involves securing a
computer network infrastructure.
Network security is typically handled
by a network administrator or
system administrator.
They implements the security policy,
network software and hardware
needed to protect a network.
A network security system typically
relies on layers of protection.
consists of multiple components
including networking monitoring and
security software in addition to
hardware and appliances.
All components work together to
increase the overall security of the
computer network.
Example : Firewall.
AN Y
Q U ESTIO N S
???
..TH
AN K
YO U