05 Integrating Security Services Flashcards
Explain the two dimensions guiding the integration of security services into communications architectures:
1) Node: which security service should be realized in which node?
2) Layer: which security service should be realized in which layer?
What is an Application?
Application: A piece of software that accomplishes some specific task (email, web service, word processing, data storage…)
What is an End System?
End System: one piece of equipment, anywhere in the range from personal computers to servers to mainframe computers.
For security purposes, one end system usually has one policy authority.
What is a Subnetwork?
Subnetwork: a collection of communication facilities being under control of one administrative organization (LAN, campus networks, WAN…)
For security purposes, one subnetwork usually has one policy authority.
What is an Inter-Network?
A collection of inter-connected subnetworks. In general, the subnets connected in an inter-network have different policy authorities.
What are the 4 levels at which distinct requirements for security protocol elements arise?
1) Application level
2) End System level
3) Subnetwork level
4) Link level
Describe the four levels at which distinct requirements for security protocol elements arise:
1) Application level: security protocol elements that are application dependent.
2) End System level: provision of protection on an end system to end system basis.
3) Subnetwork level: provision of protection over a subnetwork or an inter-network which is considered less secure than other parts of the network environment.
4) Link level: provision of protection internal to a subnetwork (ex: over a link which is considered less trusted than other parts of the subnetwork environment).
Why relationships between protocol layers and security protocol elements level are not one-to-one?
- Security mechanisms for fulfilling both end system and the subnetwork level requirements can be either realized in the transport and/or network layer.
- Link level requirements can be met by integrating security mechanisms or using “special functions” of either the link layer and/or the physical layer.
List the general considerations for Architectural Placement:
- Traffic mixing
- Route knowledge
- Number of protection points
- Protocol header protection
- Source/sink binding
Explain Traffic mixing, as a general consideration for Architectural Placement:
- Due to multiplexing, there is greater tendencies at lower levels to have data items from different source/destination-users and/or applications mixed in one data stream.
- A security service realized at one layer/level will treat the traffic of that layer/level in an equal manner, resulting in inadequate control over security mechanisms for users and applications.
- If a security policy demands for a more differentiated treatment, it should be better realized at a higher level.
Explain Route knowledge, as a general consideration for Architectural Placement:
- At lower levels, there tends to be more knowledge about the security characteristics of different routes and links.
- In environments, where such characteristics vary significantly, placing security at lower levels can have effectiveness and efficiency benefits.
- Appropiate security services can be selected on a subnetwork or link basis eliminating cost for security, where protection is unnecesary.
Explain Number of protection points, as a general consideration for Architectural Placement:
- Placing security at the application level requires security to be implemented in every sensitive application and every end system.
- Placing security at the link level requires security to be implemented at the end of every network link which is considered to be less trusted.
- Placing security in the middle of the architecture will tend to require security features to be installed at fewer points.
Explain Protocol header protection, as a general consideration for Architectural Placement:
- Security protection at higher levels can not protect protocol headers of lower protocol layers.
- The networking infrastucture might need to be protected as well.
Explain Source/sink binding, as a general consideration for Architectural Placement:
- Security services like data origin authentication and non-repudiation depend upon association of data with its source or sink.
- This is most efficiently achieved at higher levels, especially the application level.
Regarding the Application level, elaborate on some specific considerations:
- This level might be the only appropiate level, for example because:
- A security service is application specific (ex: access control for a networked file store)
- A security service needs to traverse application gateways (ex: integrity and/or confidentiality of email)
- Semantics of data is important (ex: for non-repudiation services)
- It is beyond the reach of a user/application programmer to integrate security at a lower level