A security system is s system to defend our assets from the attacks.In the physical world,these attacks are carried out at the weak points in the defense system.Likewise in the electronic world,attacks are carried out at the point of vulnerability.When the vulnerability is exploited for some interest or selfish motive,it is an attack of hacking on the system.
There are basically 4 types of attacks.
(b) Modification :- An unauthorized party gaining control of an asset and tampering with it is part of this attack.This is an attack in integrity like changinf the content of a message being transmitted through the network.
(c) Fabrication :- An unauthorized party inserts counterfeited objects into the system;for example,impersonating someone and inserting a supirious message into the network.
(d) Interruption :- An asset is destroyed or made unusable which is going to be tranmiteed from the information source to the information destination by inputing some break wall into the network which will not allow destionation to receive the packets.
(a) Interception :- An unauthorized party gaining access to an asset will be part of this attack.This attack on confidentiality like unauthorized copying of files or tapping a conversation between parties.Some of the sniffing attacks fall in this category.
GUEST POST BY Chintan
---Do you want to share you views?? Just leave a comment here. you can also drop an email on [email protected]
2 Visitor Reactions & Comments:
Great to see this blog again. Very happy to see this
@ Seenu Thanks & keep visiting
Post a Comment