Sunday, August 21, 2016

Computer security requirements and Attacks

Computer and network security address four requirements:

1. confidentiality: Requires that data only be accessible by authorized parties. This types of access includes printing, displaying and other forms of disclosure of the data.

2. Integrity: Requires that data can be modified only by authorized users. Modification includes writing, changing, changing status, deleting and creating.

3. Availability: Requires that data are available to authorized parties.

4. Authenticity: Requires that host or service be able to verify the identity of a user.

Types of Network Attacks

There are four primary classes of attacks.

1. Reconnaissance : Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities. It is also known as information gathering and, in most cases, it precedes another type of attack. Reconnaissance is similar to a thief casing a neighborhood for vulnerable homes to break into, such as an unoccupied residence, easy-to-open doors, or open windows.

2. Access : System access is the ability for an intruder to gain access to a device for which the intruder does not have an account or a password. Entering or accessing systems usually involves running a hack, script, or tool that exploits a known vulnerability of the system or application being attacked.

3. Denial of Service : Denial of service (DoS) is when an attacker disables or corrupts networks, systems, or services with the intent to deny services to intended users. DoS attacks involve either crashing the system or slowing it down to the point that it is unusable. But DoS can also be as simple as deleting or corrupting information. In most cases, performing the attack involves simply running a hack or script. For these reasons, DoS attacks are the most feared.

4. Worms, Viruses, and Trojan Horses : Malicious software can be inserted onto a hos to damage or corrupt a system, replicate itself, or deny access to networks, systems, or services. Common names for this type of software are worms, viruses, and Trojan horses.

No comments:

Post a Comment