X.805 security architecture is developed for systems providing end to end communications. It was developed by ITU-T SG 17 and was published in October 2003.
Issues which X.805 addresses are:
1. What type of protection is to be given against what kind of threats?
2. What are the various kinds of system gear and facility groupings that needs to be secured?
3. What are the different types of network exercises that needs to be secured?
X.805 architecture incorporates three security layers which are as follows:
• Infrastructure Security Layer: These are fundamental building pieces of networks services and applications. Example: routers, switches, servers etc.
• Services Security Layer: These are services given to end clients. Example: Cellular, Wi-Fi, QoS etc.
• Applications Security Layer: These are network based applications used by end-clients. Example: E-mail, E-commerce etc.
Security planes speak about the types of activities that occur on a network. X.805 architecture has three security planes, which are as follows:
• End – User Security Plane: This security plane represents the access and use of the network by the customers for various purposes, like value – added services, basic connectivity/transport etc.
• Control/Signaling Security Plane: This security plane represents activities that enable efficient functioning of the network.
• Management Security Plane: This plane represents the management of network elements, services and applications.
X.805 Security
At Aircraft Solutions, there are several samples of concerns that could lead to a breach of information or compromised branch of their system. Due to the design of their geographical layout, secure connections that encrypt
Layered Security refers to the use of a collection of or various tools to cover the gaps in security not covered by other tools. Layered Security operates on one principle in that there is no silver bullet when protecting networks or computers (Chatterjee, Hora, & Rosoff, 2015). This means that there is no single method of making systems 100 percent safe; instead,
By definition, aircraft movement encompasses areas such as runways, aircraft ramps, and taxiways. These movement areas are completely airside and require specific security measures as provided for by the law in addition to adhering to Federal Aviation Regulations. The accessibility of the aircraft movement area by public or individuals conducting specific duties makes such areas prone to security needs. Largely, the airport operator might not assume that the intentions of persons accessing these areas are not potential threat to the airport security.
Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.
The fifth layer is the session layer this establishes a connection,this layer makes and sets up the connection using co ordinates and could terminate conversations links. the session layer produces services that make authentication after an interruption and not only that but it can reconnect.and as well as the transporting layer it can also have the TCP and the UDP can provide services for all most all applications.An application layer is an abstraction layer that specifies the shared protocols and interface methods used by hosts in a communications network. The application layer abstraction is used in both of the standard models of computer networking; the Internet Protocol Suite (TCP/IP) and the Open Systems Interconnection model (OSI model).Although both models use the same term for their respective highest level layer, the detailed definitions and purposes are different.In TCP/IP, the application layer contains the communications protocols and interface methods used in process-to-process communications
An air gap is utilised to isolate a secured and non-secured network from one another to ensure security is maintained, this isolation occurs on both physical and technical levels.
1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer)
The Application layer within the OSI reference model is where the application and the user communicates. In other words, the application layer is the ending of data that is transferred in visual form to the user. This layer provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. The Application Layer functions are to provide the interface for application-specific protocols commonly used such as HyperText Transfer (HTTP), file transfer (FTP), Simple mail transfer (SMTP), Internet message Access (IMAP),
The layer starts from 7 being the top layer and 1 being the lowest layer of the OSI model. Application layer- Serves as the window for users and application processes to access networks services like web browser (Internet explorer, Mozilla) protocols – DNS & SSH etc. Presentation layer- Translates data from the format send into the format that program can understand. Session Layer- Starts and end session and also keeps them isolated protocols- SMB,NFS, Socks and allows session establishment between processes running on different stations. Network- Determines addressing method for being transmitted. Transport- Defines ports and reliability protocols- TCP, UDP. Network- logical or IP addressing: Determines best path for the destination protocols- IPV4, IPV6, ICMP, IPsec. Data link- Contain data into a frame that contains a header with a destination. Switches, Mac addressing protocols- PPTP, Token Ring. Physical Link- Determines the hardware used and the method used for data transmission like cables, network interface cards, electrical
5. What are the three primary methods for implementing security on this network, as well as the advantages and disadvantages each?
An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact.
6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?
Miller Inc. which is in the business of providing data collection and analytics services relies majorly on network security to keep its competitive advantage. This is because the customers that rely on the company's system trust that since there are sufficient security measures that have been ensured, they can store their data securely. Each of the functional models of the system should have sufficient security measures to ensure that complete security of the whole system architecture is achieved. The three functional modules are the backend module, services or operation module and customer access module. The major relationship between infrastructure and security comes in the role they play to ensure that the end user gets the data that they need when they need it and in the best way possible. Therefore for the three modules, there is a need to balance security with the right infrastructure.
Interconnection Security Agreements (ISA) are required for systems connecting between enclaves that require the hosting enclave to enable PPS outside of their already established and approved business practices. The AMCOM Interconnection Security Agreement Standard Operating Procedures (ISA SOP) defines the procedures to be used when developing ISAs. While AMCOM’s ISA Template, Section 2: System Security Considerations provides examples of security concerns to be negotiated during the ISA process, every interconnection is different and additional attributes may be discovered and will be documented during the ISA
The application layer: this layer allows different applications to communicate with each other’s. In order to exchange different data over the network connection, the protocols included in this layer set up the standards such as DNS, HTTP, FTP. The data coded in this layer will be encapsulated to transport layer for further packing.