×
☰ Menu

 

The OSI (Open System Interconnection) Security Architecture

Computer data frequently transfers outside of a secure physical environment to another computer. Once your data has gotten out of control, people with bad intentions might edit or fabricate it for their own amusement or financial gain. A systematic approach to identifying security requirements and categorizing approaches to meeting those criteria is necessary for the security manager to properly assess an organization's security needs and evaluate and choose various security products and policies. This is difficult enough in a centralized data processing environment.

ITU-T Recommendation X.800 defines a systematic approach to security requirements as Security Architecture for OSI. Managers can use the OSI security architecture to organize their responsibility for security. Furthermore, because this architecture is an international standard, computer and communications vendors have developed security measures for their products and services related to this organized specification of services and procedures.

Need of OSI Security Architecture:

The following are the requirements for OSI Architecture in an organization:

1: Security Needs: OSI Architecture addresses an organization's security requirements. OSI Architecture ensures safety and security by preventing risk and threats.

2: Systematic Arrangement: The OSI Architecture provides a systematic approach to an organization's security requirements. The OSI architecture ensures that security policies are well maintained.

3: Centralized Processing: The OSI Architecture keeps a centralized processing environment. LAN and WAN aid in the centralization of OSI Architecture processing.