Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

please help, with explanations Use a matrix format to show the relationship betw

ID: 660626 • Letter: P

Question

please help, with explanations

Use a matrix format to show the relationship between X.800 security services and security mechanisms attacks. The matrix columns correspond to mechanisms and the matrix rows correspond to services.

Encipherment

Digital Signature

Access Control

Data Integrity

Authentication Exchange

Traffic Padding

Routing Control

Notarization

Peer Entity Authentication

Data Origin Authentication

Access Control

Confidentiality

Traffic Flow Confidentiality

Data Integrity

Non-Repudiation

Availability

Use a matrix format to show the relationship between X.800 security services and network security attacks. The matrix columns correspond to attacks and the matrix rows correspond to services.

Release of Message Contents

Traffic Analysis

Masquerade

Replay

Modification of Messages

Denial of Service

Peer Entity Authentication

Data Origin Authentication

Access Control

Confidentiality

Traffic Flow Confidentiality

Data Integrity

Non-Repudiation

Availability

Encipherment

Digital Signature

Access Control

Data Integrity

Authentication Exchange

Traffic Padding

Routing Control

Notarization

Peer Entity Authentication

Data Origin Authentication

Access Control

Confidentiality

Traffic Flow Confidentiality

Data Integrity

Non-Repudiation

Availability

Explanation / Answer

Encipherment

Digital Signature

Access Control

Data Integrity

Authentication Exchange

Traffic Padding

Routing Control

Notarization

Release of Message Contents

Traffic Analysis

Masquerade

Replay

Modification of Messages

Denial of Service

Peer Entity Authentication

y

y

y

y

Data Origin Authentication

y

y

y

y

Access Control

y

y

y

Confidentiality

y

y

y

Traffic Flow Confidentiality

y

y

y

y

Data Integrity

y

y

y

y

Non-Repudiation

y

y

y

y

Availability

Y

y

y

y

1)Peer Entity Authentication : since authentication is done between peers so encipherment digital signature authentication and dos are accepted.

2)Data Origin Authentication: to send data

Encipherment

Digital Signature

Access Control

Data Integrity

Authentication Exchange

Traffic Padding

Routing Control

Notarization

Release of Message Contents

Traffic Analysis

Masquerade

Replay

Modification of Messages

Denial of Service

Peer Entity Authentication

y

y

y

y

Data Origin Authentication

y

y

y

y

Access Control

y

y

y

Confidentiality

y

y

y

Traffic Flow Confidentiality

y

y

y

y

Data Integrity

y

y

y

y

Non-Repudiation

y

y

y

y

Availability

Y

y

y

y