Computer Architecture
Computer Architecture
ID: 110043422
Security threats
Introduction
The communication has been playing an important role since the dawn of civilization. It has
become an integral part of existence in the societies which are highly networked where we live in.
A few types of communication types have been developed during the earlier stage of civilization
which resulted in evolving many types of communications till today. The communication through
the internet is the best examples of the latest communication types.There are different types of
communications prevailing in our day to day life such as Radio communication, Mobile
communication, Telephonic communication and Network communication. Each communication
type has its own importance but the communication over a network has been mostly implemented
in our life and has been evolved as the most powerful and highly developed communication
methods. The network communication method has created a great impact on lives of humans. So
as this method is gradually developing and being used by many individuals and organizations,
such advance in the technology has resulted in the security issues such as threats or malicious
attacks to the individuals and organizations. So there is a need to encounter these threats and
attacks which resulted in the introduction and development of different mechanisms for providing
different services and CRYPTOGRAPHY is one of the mechanisms which is mostly used in the
network communication. Computers and networks aren’t safe, unless there is proper information
security implemented.
Threats
● A threat is anything that can disrupt the operation, functioning, integrity, or availability
of a network or system.
● There are different categories of threats;
✓ Natural threats - occurrences such as floods, earthquakes, and storms.
✓ Unintentional threats that are the result of accidents and stupidity.
✓ Intentional threats that are the result of malicious intent. Each type of
threat can be deadly to a network.
Examples of Threats:
❖ Unauthorized Access
Happens when an unauthorized individuals gains access to the system either
through passwords and access credentials divulged to them or stolen from
authorized users
❖ Malicious software
➢ Viruses
■ Rogue software program that attaches itself to other software
programs or data files in order to be executed
➢ Worms
■ Independent computer programs that copy themselves from one
computer to other computers over a network
Trojan horses
■ Software program that appears to be benign but then does something
other than expected
Key loggers
■ Record every keystroke on computer to steal serial numbers,
passwords, launch Internet attacks
❖ Spoofing
➢ Faking an e-mail address or Web page to trick users into passing along
critical information like passwords or credit card numbers
➢ Redirecting Web link to address different from intended one,
with site masquerading as intended destination
❖ Sniffer
➢ Eavesdropping program that monitors information traveling over
network
➢ Programs that search individual packets of data as they pass
through the Internet
➢ Legitimate use → Identify potential network trouble spot or
criminal activity in network Capturing passwords or entire
contents
Enables hackers to steal proprietary information (e-mail, company files).
Attacks
➢ Security Attack: Any action that compromises the security of information.
➢ Security Mechanism: A mechanism that is designed to detect, prevent, or recover from
a security attack.
➢ Security Service: A service that enhances the security of data processing systems and
information transfers. A security service makes use of one or more security mechanisms
Forms of Attacks
i. Interruption: This is an attack on availability
ii. Interception: This is an attack on confidentiality
iii. Modification: This is an attack on integrity
iv. Fabrication: This is an attack on authenticity
Interruption Attack:
In an interruption attack, a network service is made degraded or unavailable for legitimate use.
They are the attacks against the availability of the network.
Conclusion
Computer security attempts to ensure the confidentiality, integrity, and availability of computing
systems and their components. Three principal parts of a computing system are subject to attacks:
hardware, software, and data. These three, and the communications among them, are susceptible
to computer security vulnerabilities. In turn, those people and systems interested in compromising
a system can devise attacks that exploit the vulnerabilities.