What is meant by security and services?

Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers[1] as defined by ITUT X.800 Recommendation. X.800 and ISO 74982 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture)[2] are technically aligned. https://princesecurityservice.com/security-guard/ This model is widely recognized 

A more general definition is in CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America:[5]

broken image

A capability that supports one, or more, of the security requirements (Confidentiality, Integrity, Availability). Examples of security services are key management, access control, and authentication. Another authoritative definition is in W3C Web service Glossary [6] adopted by NIST SP 80095:[7]

A processing or communication service that is provided by a system to give a specific kind of protection to resources, where said resources may reside with said system or reside with other systems, for example, an authentication service or a PKIbased document attribution and authentication service. Security services are a superset of AAA services. Security services typically implement part of a security policy and are implemented through security mechanisms. Information security and computer security are areas that address the confidentiality, completeness, and availability of information assets of an organization (company or authority) or the information managed by a computer, the so-called CIA triad requirements.


There are threats that can exploit one or more vulnerabilities to attack a resource (information or device used to manage the resource). Resources can be protected by one or more countermeasures or security controls. [8]

As a result, security services implement some of the measures to meet your organization’s security requirements. Communication protocols are defined to allow different devices (computers, routers, mobile phones) to communicate data in a standardized way.


The ITUT organization publishes a number of protocols. The general architecture of these protocols is defined in Recommendation X.200. [Ten]

The various means (air, wired) and methods (protocols and protocol stacks) for communicating are called communication networks.
Security requirements apply to information sent over the network. The field of security on the network is called network security. [11]

X.800 Recommendations: [1]

It provides a general description of the security services and related mechanisms that can be provided by the reference model. When
Defines a position in the reference model that can provide services and mechanisms.

This recommendation extends the scope of the X.200 recommendation to cover secure communication between open systems.
According to the X.200 recommendations, the so-called OSI reference model has seven layers, each commonly referred to as the N layer. The N + 1 unit requests outbound service to the N unit. [Ten]

At each level, the two entities (Nentity) interact using the (N) protocol by sending a protocol data unit (PDU). Read more…