Threats and Attacks

 Four kinds of threats and their types of attacks

1) Unauthorized disclosure

  • A threat to system confidentiality
  • Types of Attacks:
    1. Exposure
      • The attacker obtains unauthorized knowledge of sensitive data.  
    2. Interception
      • The attacker gain access to data being transmitted
      • A common attack in communication network 
    3. Inference
      • The attacker gains information from analyzing the pattern of traffic in a network 
    4. Intrusion
      • The attacker gains unauthorized access to data 
      • Probably after breaking the system’s access control protection 

2) Deception

  • A threat to system or data integrity
  • Types of Attacks:
    1. Masquerade
      • The attacker accesses to the system acting as an authorized user.
      • The attacker may have the login name and password.  
    2. Falsification
      • The attacker modifies or replaces valid data or produces false data 
    3. Repudiation 
      • The attacker denies 
        • sending the data,  
        • denies receiving the data, 
        • Possessing the data 

3)  Disruption

  • A threat to system availability and integrity
  • Types of Attacks:
    1. Incapacitation
      • An attack on system availability by destructing or damaging system resources (e.g., hardware) and their services.
    2. Corruption
      • An attack to system integrity such that the system resources or services operate in an unintended manner. 
      • This can be done by a malware or an attacker that modifies system function
    3. Obstruction 
      • An attack to system availability by interfering,  altering, or overloading communication functions

4)  Usurpation

  • A threat to system integrity
  • Types of Attacks:
    1. Misappropriation
      • An unauthorized software uses the OS and hardware resources
      • E.g., DoS attack that steals system services
    2. Misuse
      • Disabling security functions, can be by the following means: 
        • Malicious logic
        • An attacker that gains access to the system



Comments

Popular posts from this blog

What is Cybersecurity?

CIA Triad

Ensuring Security in a System