Explain the two dimensions guiding the integration of security services into communications architectures:
1) Node: which security service should be realized in which node?
2) Layer: which security service should be realized in which layer?
What is an Application?
Application: A piece of software that accomplishes some specific task (email, web service, word processing, data storage…)
What is an End System?
End System: one piece of equipment, anywhere in the range from personal computers to servers to mainframe computers.
For security purposes, one end system usually has one policy authority.
What is a Subnetwork?
Subnetwork: a collection of communication facilities being under control of one administrative organization (LAN, campus networks, WAN…)
For security purposes, one subnetwork usually has one policy authority.
What is an Inter-Network?
A collection of inter-connected subnetworks. In general, the subnets connected in an inter-network have different policy authorities.
What are the 4 levels at which distinct requirements for security protocol elements arise?
1) Application level
2) End System level
3) Subnetwork level
4) Link level
Describe the four levels at which distinct requirements for security protocol elements arise:
1) Application level: security protocol elements that are application dependent.
2) End System level: provision of protection on an end system to end system basis.
3) Subnetwork level: provision of protection over a subnetwork or an inter-network which is considered less secure than other parts of the network environment.
4) Link level: provision of protection internal to a subnetwork (ex: over a link which is considered less trusted than other parts of the subnetwork environment).
Why relationships between protocol layers and security protocol elements level are not one-to-one?
List the general considerations for Architectural Placement:
Explain Traffic mixing, as a general consideration for Architectural Placement:
Explain Route knowledge, as a general consideration for Architectural Placement:
Explain Number of protection points, as a general consideration for Architectural Placement:
Explain Protocol header protection, as a general consideration for Architectural Placement:
Explain Source/sink binding, as a general consideration for Architectural Placement:
Regarding the Application level, elaborate on some specific considerations:
Regarding the End system level, elaborate on some specific considerations:
Regarding the Subnetwork level, elaborate on some specific considerations:
Regarding the Link level, elaborate on some specific considerations:
Explain the 3 key characteristics of Human User Interactions:
In which ways do communications supporting authentication can be realized?
What are the 4 benefits of integrating security services into lower network layers (instead of Applications)?
Compare the integration into End Systems vs. Intermediate Systems:
Note: an integration in both end systems and intermediate systems might be appropiate, depending on the security objectives.
What two main questions guide the integration of security services into communications architectures?
Mention the 4 levels of the pragmatic model of networked computing that can also guide the design choices of security services into communications: