Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Information security Notes

Rating
-
Sold
-
Pages
4
Grade
B
Uploaded on
05-05-2026
Written in
2025/2026

I am providing information security important questions and answers

Institution
Course

Content preview

Information Security – INSEM Detailed Answers

1. OSI Security Architecture

• OSI Security Architecture is a framework developed by ISO to define security attacks, services and
mechanisms.

• It helps to understand different types of threats in a network system.

• It identifies security services that can protect data and communication.

• It defines security mechanisms used to implement these services.

• The architecture mainly focuses on confidentiality, integrity and authentication.

• It is used in communication systems to design secure networks.

• It provides a structured approach to implement information security.

Security Attacks
|
v
Security Services
|
v
Security Mechanisms




2. Types of Security Attacks (Passive and Active)

• A security attack is an attempt to access, modify or destroy information without authorization.

• Passive attacks monitor communication but do not change the data.

• Examples of passive attacks include eavesdropping and traffic analysis.

• Active attacks modify data or disrupt system operations.

• Examples include masquerade attacks, replay attacks and message modification.

• Denial of Service (DoS) is a common active attack that makes services unavailable.

• Active attacks are more dangerous because they alter the data.



3. Security Services in Information Security

• Security services are techniques used to protect information and communication.

• Confidentiality ensures that data is accessible only to authorized users.

• Integrity ensures that data is not modified during transmission.

• Authentication verifies the identity of users or systems.

• Non-repudiation prevents the sender from denying sending the message.

• Access control restricts unauthorized users from accessing resources.

Written for

Institution
Course

Document information

Uploaded on
May 5, 2026
Number of pages
4
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
prathamsonawane

Get to know the seller

Seller avatar
prathamsonawane Shatabdi Institute of Engineering
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
4 days
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions