Threats and Attacks
Four kinds of threats and their types of attacks
1) Unauthorized disclosure
- A threat to system confidentiality
- Types of Attacks:
- Exposure
- The attacker obtains unauthorized knowledge of sensitive data.
- Interception
- The attacker gain access to data being transmitted
- A common attack in communication network
- Inference
- The attacker gains information from analyzing the pattern of traffic in a network
- Intrusion
- The attacker gains unauthorized access to data
- Probably after breaking the system’s access control protection
2) Deception
- A threat to system or data integrity
- Types of Attacks:
- Masquerade.
- The attacker accesses to the system acting as an authorized user.
- The attacker may have the login name and password.
- Falsification
- The attacker modifies or replaces valid data or produces false data
- Repudiation
- The attacker denies
- sending the data,
- denies receiving the data,
- Possessing the data
3) Disruption
- A threat to system availability and integrity
- Types of Attacks:
- Incapacitation
- An attack on system availability by destructing or damaging system resources (e.g., hardware) and their services.
- Corruption
- An attack to system integrity such that the system resources or services operate in an unintended manner.
- This can be done by a malware or an attacker that modifies system function
- Obstruction
- An attack to system availability by interfering, altering, or overloading communication functions
4) Usurpation
- A threat to system integrity
- Types of Attacks:
- Misappropriation
- An unauthorized software uses the OS and hardware resources
- E.g., DoS attack that steals system services
- Misuse
- Disabling security functions, can be by the following means:
- Malicious logic
- An attacker that gains access to the system
Comments
Post a Comment