SlideShare a Scribd company logo
Application Layer Security
Protocol
By Prof. Kirti Ahirrao
Index:
• Introduction to Application Layer
• Types of Application Layer Protocols
• Security-Enhanced Application Layer Protocol
• Authentication & Key Distribution System
• AKA in CDMA & UMTS
• Layering Security Protocol above the Application Layer
Prof. Kirti Ahirrao 2
Application
Layer
• It is an abstraction layer.
• It specifies the
shared communications protocols.
• It uses interface methods
by hosts in a communications
network.
• The application layer abstraction
used in both of the standard models
: TCP/IP suite & OSI model.
Prof. Kirti Ahirrao 3
Application
Layer
• It is the closest layer to the end user,
• It provides hackers with the largest threat
surface.
• Poor app layer security can lead to
performance and stability issues, data theft,
and in some cases the network being taken
down.
• Application layer attacks include distributed
denial-of-service attacks (DDoS) attacks,
HTTP floods, SQL injections, cross-site
scripting, parameter tampering.
• Most organizations have application layer
security protections, such as web
application firewalls (WAFs), secure web
gateway services, and others.
Prof. Kirti Ahirrao 4
Types of Application Layer Protocol
• Remote login to hosts: Telnet.
• File transfer: File Transfer Protocol (FTP) & Trivial File Transfer
Protocol (TFTP).
• Electronic mail transport: Simple Mail Transfer Protocol (SMTP).
• Networking support: Domain Name System (DNS).
• Host initialization: BOOTP.
• Remote host management: Simple Network Management
Protocol (SNMP), Common Management Information Protocol over TCP
(CMOT).
Prof. Kirti Ahirrao 5
Security-Enhanced Application Layer Protocol
• Secure Shell (SSH) is a widely used and deployed protocol that serves as a secure replacement for
terminal access and file transfer.
• DNS Security, or DNSSEC in short, refers to a set of security extensions and enhancements for DNS.
• Furthermore, there are several cryptographic file systems that have been developed and proposed in
the past, e.g: Cryptographic File System (CFS) and the Andrew File System (AFS).
• The starting point was the specification of the Secure Hypertext Transfer Protocol (S-HTTP) that had
been developed and was originally proposed by Eric Rescorla and Allan Schiffman on behalf of the
CommerceNet consortium in the early 1990s.
• S-HTTP version 1.0 was publicly released in June 1994 and distributed by the CommerceNet
consortium.
• Since 1995, the S-HTTP specification has been further refined under the auspices of the IETF WTS
WG.
Prof. Kirti Ahirrao 6
Authentication & Key Agreement System(AKA)
• It is a security protocol used in 3G networks.
• It is used for one-time password generation mechanism
for digest access authentication.
• AKA is a challenge-response based mechanism that uses symmetric cryptography.
• AKA also called as 3G Authentication or Enhanced Subscriber Authorization (ESA).
• AKA works in CDMA(Code Division Multiplex Access) & UMTS(Universal Mobile
telecommunications System).
Prof. Kirti Ahirrao 7
AKA in CDMA
1. It provides procedures for mutual authentication of the Mobile Station (MS) and serving system.
2. The successful execution of AKA results in the establishment of a security association (i.e., set of
security data) between the MS and serving system that enables a set of security services to be
provided.
3. Major advantages of AKA over CAVE-based authentication include:
• Larger authentication keys (128-bit )
• Stronger hash function (SHA-1)
• Support for mutual authentication
• Support for signaling message data integrity
• Support for signaling information encryption
• Support for user data encryption
Prof. Kirti Ahirrao 8
AKA in UMTS
• This performs authentication and session key distribution
in Universal Mobile Telecommunications System (UMTS) networks.
• It is a challenge-response based mechanism that uses symmetric
cryptography.
• It is typically run in a UMTS IP Multimedia Services Identity
Module (ISIM), which is an application on a UICC (Universal
Integrated Circuit Card).
• AKA is defined in RFC 3310
Prof. Kirti Ahirrao 9
Layered Security Protocol
• Layered security, also known as layered defense.
• It describes the practice of combining multiple mitigating security controls to protect resources and
data.
• Layered security can be used in any environment, from military operations, to individuals, and
community residents (homeowners, neighborhood watch groups, etc).
• In other words, "layered security is the practice of using many different security controls at different
levels to protect assets.
• This provides strength and depth to reduce the effects of a threat.
• Your goal is to create redundancies (backups) in case security measures fail, are bypassed, or
defeated. Placing assets in the innermost perimeter will provide layers of security measures at
increasing distances from the protected asset.
• The number of layers and the security measures you use, will depend on the threat and importance
of the asset".
Prof. Kirti Ahirrao 10
Layered security
Prof. Kirti Ahirrao 11
References:
• en.wikipedia.org/wiki/
• www.f5.com/services/
Prof. Kirti Ahirrao 12
Thank You
Prof. Kirti Ahirrao 13
Ad

More Related Content

What's hot (20)

Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
Vittorio Giovara
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
Ajaykumar967485
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Pgp
PgpPgp
Pgp
Reham Maher El-Safarini
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
RajaKrishnan M
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Vasuki Ramasamy
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Authenticated Encryption Gcm Ccm
Authenticated Encryption Gcm CcmAuthenticated Encryption Gcm Ccm
Authenticated Encryption Gcm Ccm
Vittorio Giovara
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
Ajaykumar967485
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
RajaKrishnan M
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Vasuki Ramasamy
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 

Similar to Application layer security protocol (20)

saag-3.ppt
saag-3.pptsaag-3.ppt
saag-3.ppt
HazemElabed2
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
Alan Tatourian
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
willcoxjanay
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
Pandiya Rajan
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
Tamer Nadeem
 
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
asdas dwasdasf adasdasasdasd asdasdasdasdqwqasdas dwasdasf adasdasasdasd asdasdasdasdqwq
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
researchai1
 
security of the information and the technoogy
security of the information and the technoogysecurity of the information and the technoogy
security of the information and the technoogy
researchai1
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
Alexander Decker
 
SecurityBasics.ppt a good thing by pakiza
SecurityBasics.ppt a good thing by pakizaSecurityBasics.ppt a good thing by pakiza
SecurityBasics.ppt a good thing by pakiza
pakpra733
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
Chuck Speicher
 
security issue
security issuesecurity issue
security issue
JAINIK PATEL
 
Chapter 2 Overview of Commercial Issues.pptx
Chapter 2 Overview of Commercial Issues.pptxChapter 2 Overview of Commercial Issues.pptx
Chapter 2 Overview of Commercial Issues.pptx
mc0225225
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
Alexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
Alexander Decker
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptxCRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
cns unit 1.pptx
cns unit 1.pptxcns unit 1.pptx
cns unit 1.pptx
Saranya Natarajan
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
HNDE Labuduwa Galle
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
Alan Tatourian
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
willcoxjanay
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
Pandiya Rajan
 
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
asdas dwasdasf adasdasasdasd asdasdasdasdqwqasdas dwasdasf adasdasasdasd asdasdasdasdqwq
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
researchai1
 
security of the information and the technoogy
security of the information and the technoogysecurity of the information and the technoogy
security of the information and the technoogy
researchai1
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
Alexander Decker
 
SecurityBasics.ppt a good thing by pakiza
SecurityBasics.ppt a good thing by pakizaSecurityBasics.ppt a good thing by pakiza
SecurityBasics.ppt a good thing by pakiza
pakpra733
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
Chuck Speicher
 
Chapter 2 Overview of Commercial Issues.pptx
Chapter 2 Overview of Commercial Issues.pptxChapter 2 Overview of Commercial Issues.pptx
Chapter 2 Overview of Commercial Issues.pptx
mc0225225
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
Alexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
Alexander Decker
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptxCRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
Ad

More from Kirti Ahirrao (6)

BusTopolgy.pptx
BusTopolgy.pptxBusTopolgy.pptx
BusTopolgy.pptx
Kirti Ahirrao
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Kirti Ahirrao
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
Kirti Ahirrao
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
Kirti Ahirrao
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
Kirti Ahirrao
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
Kirti Ahirrao
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
Kirti Ahirrao
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Ad

Recently uploaded (20)

History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
*"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"**"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"*
Arshad Shaikh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
The History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptxThe History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Association for Project Management
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
*"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"**"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"*
Arshad Shaikh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
Mental Health Assessment in 5th semester bsc. nursing and also used in 2nd ye...
parmarjuli1412
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...Transform tomorrow: Master benefits analysis with Gen AI today webinar,  30 A...
Transform tomorrow: Master benefits analysis with Gen AI today webinar, 30 A...
Association for Project Management
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 

Application layer security protocol

  • 2. Index: • Introduction to Application Layer • Types of Application Layer Protocols • Security-Enhanced Application Layer Protocol • Authentication & Key Distribution System • AKA in CDMA & UMTS • Layering Security Protocol above the Application Layer Prof. Kirti Ahirrao 2
  • 3. Application Layer • It is an abstraction layer. • It specifies the shared communications protocols. • It uses interface methods by hosts in a communications network. • The application layer abstraction used in both of the standard models : TCP/IP suite & OSI model. Prof. Kirti Ahirrao 3
  • 4. Application Layer • It is the closest layer to the end user, • It provides hackers with the largest threat surface. • Poor app layer security can lead to performance and stability issues, data theft, and in some cases the network being taken down. • Application layer attacks include distributed denial-of-service attacks (DDoS) attacks, HTTP floods, SQL injections, cross-site scripting, parameter tampering. • Most organizations have application layer security protections, such as web application firewalls (WAFs), secure web gateway services, and others. Prof. Kirti Ahirrao 4
  • 5. Types of Application Layer Protocol • Remote login to hosts: Telnet. • File transfer: File Transfer Protocol (FTP) & Trivial File Transfer Protocol (TFTP). • Electronic mail transport: Simple Mail Transfer Protocol (SMTP). • Networking support: Domain Name System (DNS). • Host initialization: BOOTP. • Remote host management: Simple Network Management Protocol (SNMP), Common Management Information Protocol over TCP (CMOT). Prof. Kirti Ahirrao 5
  • 6. Security-Enhanced Application Layer Protocol • Secure Shell (SSH) is a widely used and deployed protocol that serves as a secure replacement for terminal access and file transfer. • DNS Security, or DNSSEC in short, refers to a set of security extensions and enhancements for DNS. • Furthermore, there are several cryptographic file systems that have been developed and proposed in the past, e.g: Cryptographic File System (CFS) and the Andrew File System (AFS). • The starting point was the specification of the Secure Hypertext Transfer Protocol (S-HTTP) that had been developed and was originally proposed by Eric Rescorla and Allan Schiffman on behalf of the CommerceNet consortium in the early 1990s. • S-HTTP version 1.0 was publicly released in June 1994 and distributed by the CommerceNet consortium. • Since 1995, the S-HTTP specification has been further refined under the auspices of the IETF WTS WG. Prof. Kirti Ahirrao 6
  • 7. Authentication & Key Agreement System(AKA) • It is a security protocol used in 3G networks. • It is used for one-time password generation mechanism for digest access authentication. • AKA is a challenge-response based mechanism that uses symmetric cryptography. • AKA also called as 3G Authentication or Enhanced Subscriber Authorization (ESA). • AKA works in CDMA(Code Division Multiplex Access) & UMTS(Universal Mobile telecommunications System). Prof. Kirti Ahirrao 7
  • 8. AKA in CDMA 1. It provides procedures for mutual authentication of the Mobile Station (MS) and serving system. 2. The successful execution of AKA results in the establishment of a security association (i.e., set of security data) between the MS and serving system that enables a set of security services to be provided. 3. Major advantages of AKA over CAVE-based authentication include: • Larger authentication keys (128-bit ) • Stronger hash function (SHA-1) • Support for mutual authentication • Support for signaling message data integrity • Support for signaling information encryption • Support for user data encryption Prof. Kirti Ahirrao 8
  • 9. AKA in UMTS • This performs authentication and session key distribution in Universal Mobile Telecommunications System (UMTS) networks. • It is a challenge-response based mechanism that uses symmetric cryptography. • It is typically run in a UMTS IP Multimedia Services Identity Module (ISIM), which is an application on a UICC (Universal Integrated Circuit Card). • AKA is defined in RFC 3310 Prof. Kirti Ahirrao 9
  • 10. Layered Security Protocol • Layered security, also known as layered defense. • It describes the practice of combining multiple mitigating security controls to protect resources and data. • Layered security can be used in any environment, from military operations, to individuals, and community residents (homeowners, neighborhood watch groups, etc). • In other words, "layered security is the practice of using many different security controls at different levels to protect assets. • This provides strength and depth to reduce the effects of a threat. • Your goal is to create redundancies (backups) in case security measures fail, are bypassed, or defeated. Placing assets in the innermost perimeter will provide layers of security measures at increasing distances from the protected asset. • The number of layers and the security measures you use, will depend on the threat and importance of the asset". Prof. Kirti Ahirrao 10
  • 13. Thank You Prof. Kirti Ahirrao 13
  翻译: