Thursday, February 15, 2007

Security Chit Chat -2-

Before going and talk about the security fields by more details ,We should first view the Types of attacks .

The Attack is any action that compromises the security of information owned by an organization ,One may have two classifications of attacks, according to the form of attack and the effect of this attack.

The Forms of Attack :

A- Interruption:-
An asset of the system is destroyed or becomes unavailable. This is an attack on availability. Examples include destruction of a piece of hardware, cutting communication line.

B- Interception:-
An unauthorized party gains access to an asset. This is an attack on confidentiality.

C- Modification:-
An unauthorized party not only gains access but also change the data. This is an attack on Integrity.

D- Fabrication:-
An unauthorized party inserts false object into the system. This is attack on authenticity.

The Effects of Attack :

Another useful categorization according to the effect of these attacks: passive attacks and active attack.

A-Passive Attacks:-
These attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted.

B-Active Attacks:-
Attacks which refer to deliberate modifications made to the message stream . also it can be for the purpose of injecting false message or deleting message.

No comments: