Cyber Security
Cyber Security
Cyber Security
systems
1. Functional classifications
1.1 Integrity Attacks: Integrity of information refers to protecting information from being modified
by unauthorized parties.
Network Attacks against Integrity
Salami attacks: Salami attacks are a series of minor data security attacks that together
result in a larger attack. For example, deducting a very small amount or money from a bank
account which is not noticeable. But when the deduct very small amounts from large number
of accounts, it become a huge amount.
Data diddling attacks: Data diddling is an illegal or unauthorized data alteration. Changing
data before or as it is input into a computer or output. Example: Account executives can
change the employee time sheet information of employees before entering to the HR payroll
application.
Trust relationship attacks: Trust relationship attacks exploit the trust between different
devices in a network.
Man-in-the-middle attacks: A man-in-the-middle attack is a type of network attack where
the attacker sits between two devices that are communicating to manipulate the data as it
moves between them.
Session hijacking attacks: Session hijacking is another type of network attack where the
attacker hacks a computer session to gain unauthorized access to information or services in
a computer system.f
1.2 Privacy Attacks
● Deleting data
● Blocking data
● Modifying data
● Copying data
● Disrupting the performance of computers or computer networks
● Unlike computer viruses and worms, Trojans are not able to self-replicate.