Week1. Introduction To Information Security. Basic Terminology
Week1. Introduction To Information Security. Basic Terminology
Introduction to Information
Security. Basic Terminology.
• Contact
Email: [email protected]
Office 802 or 112
Source: https://genesisdatabase.wordpress.com/
January IITU, Information Security 15
• Interruption – a data of the system becomes
lost, unavailable, or unusable.
• Examples include
– Erasure of a program or data file
– Malicious destruction of a hardware device
Source: https://genesisdatabase.wordpress.com/
January IITU, Information Security 16
• Modification – unauthorized, change tamper
with a data.
• For example,
– Someone might change the values in a database
Source: https://genesisdatabase.wordpress.com/
January IITU, Information Security 17
• Fabrication – E.g. Unauthorized insertion to a
existing database.
Source: https://genesisdatabase.wordpress.com/
January IITU, Information Security 18
Attack
• An assault on system security
• A deliberate attempt to evade security
services
• Kind of attacks:
– Passive attacks
– Active attacks