1.4. Security Services (original) (raw)
Connected: An Internet Encyclopedia
1.4. Security Services
Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1446
Up: 1. Introduction
Prev: 1.3. Goals and Constraints
Next: 1.5. Mechanisms
1.4. Security Services
1.4. Security Services
The security services necessary to support the goals of a SNMPv2 security protocol are as follows.
Data Integrity
is the provision of the property that data has not been altered or destroyed in an unauthorized manner, nor have data sequences been altered to an extent greater than can occur non-maliciously.
Data Origin Authentication
is the provision of the property that the claimed origin of received data is corroborated.
Data Confidentiality
is the provision of the property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
The protocols specified in this memo require both data integrity and data origin authentication to be used at all times. For these protocols, it is not possible to realize data integrity without data origin authentication, nor is it possible to realize data origin authentication without data integrity.
Further, there is no provision for data confidentiality without both data integrity and data origin authentication.
Next: 1.5. Mechanisms
Connected: An Internet Encyclopedia
1.4. Security Services