1. Security Goals

Security goals define what needs to be protected in an information system. These are high-level objectives that guide the design and implementation of security.

The main security goals are:

GoalDescription
ConfidentialityEnsuring that information is not accessed by unauthorized users.
IntegrityProtecting data from being altered by unauthorized parties.
AvailabilityEnsuring reliable and timely access to resources by authorized users.
AuthenticationVerifying the identity of users and systems.
Non-repudiationPreventing denial of actions performed (e.g., sending a message or transaction).

2. Security Services

Security services are the functions or services provided to meet security goals. These are defined by standards like the OSI model.

Security ServicePurpose
AuthenticationVerifies the identity of communicating entities.
Access ControlLimits access to system resources to authorized users only.
Data ConfidentialityPrevents unauthorized disclosure of data.
Data IntegrityEnsures that data has not been tampered with.
Non-repudiationEnsures actions cannot be denied later.
AvailabilityEnsures systems are up and running when needed.

3. Security Mechanisms

Security mechanisms are the tools and techniques used to implement security services.

MechanismDescription
EncryptionProtects confidentiality by making data unreadable without a key.
Digital SignaturesEnsures integrity, authentication, and non-repudiation.
Hash FunctionsDetect changes in data (used in integrity).
FirewallsControls incoming/outgoing network traffic (access control).
Authentication ProtocolsVerifies user/system identity.
Intrusion Detection Systems (IDS)Monitors and detects suspicious activities.

✅ Relationship between Security Services and Mechanisms

  • Security Services are like goals or functions we want to achieve.

  • Security Mechanisms are the means or tools to achieve those services.

📌 Example:

  • Service: Data Confidentiality
    Mechanism: Encryption (e.g., AES, RSA)

  • Service: Authentication
    Mechanism: Passwords, Biometrics, Digital Certificates

Security GoalSecurity ServiceSecurity Mechanism (Examples)
ConfidentialityData ConfidentialityEncryption (AES, RSA), Access Control Lists (ACLs)
IntegrityData IntegrityHash Functions (SHA-256), Checksums, Digital Signatures
AvailabilityAvailability ServiceRedundancy, Load Balancers, Firewalls, DoS Protection
AuthenticationAuthentication ServicePasswords, Biometrics, Digital Certificates (PKI), OTP
Non-repudiationNon-repudiation ServiceDigital Signatures, Logging, Timestamps
Access ControlAccess Control ServiceAuthorization Policies, Role-Based Access Control (RBAC)