ASSU Chapter 2
ASSU Chapter 2
• Fire, Lightning
• Wind, etc
Virus
DDoS
Organized Crime
Well funded
Sabotage
♦ Interruption
An asset of the system is destroyed of becomes
unavailable or unusable
Attack on availability
Destruction of hardware
Cutting of a communication line
Disabling the file management system
Interruption
Cont..
♦ Interception
An unauthorized party gains access to an asset
Attack on confidentiality
Wiretapping to capture data in a network
Illicit copying of files or programs
The emphasis is prevention rather than detection
Interception
Cont..
♦ Fabrication
An unauthorized party inserts counterfeit objects into
the system
Attack on authenticity
Insertion of spurious messages in a network
Addition of records to a file
Fabrication
Cont..
♦ Modification
An unauthorized party not only gains access but
tampers with an asset
Attack on integrity
Changing values in a data file
Altering a program so that it performs differently
Modifying the content of messages being transmitted in
a network
Modification
Attack Types
Application/
Social Engineering Service Attack
Cryptographic
Wireless Attack
Attacks
Social Engineering
• Often rely on exploiting basic human instincts such as trust and fear
Social Eng. Attacks
•Passive attacks (off line attack): the goal is to obtain the information transmitted.
traffic analysis - e.g., location and identity of communicating hosts, frequency and
Denial of service
•Passive attacks are difficult to detect but easy to prevent whereas acti
ve attracts are easy to detect but difficult to prevent
Passive Versus Active Attacks
Security Mechanisms
Prevention:
– Encryption
– Physical Controls
Prevention mechanisms are often cumbersome and do not always work perfec
fail when the password becomes known to a person other than the owner.
Detection Mechanisms
Detection is used when an attack cannot be prevented and it also in
dicates the effectiveness of prevention measures.
When you log into the design center’s unix servers, it gives you th
e IP address of the last successful login.
Recovery
Recovery has several aspects.
Recovery: call the police, replace stolen items, make an insurance claim
Example E-Commerce
Prevention: encrypt your orders, rely on the merchant to perform checks on the cal
ler, don’t use the Internet (?) …
Footnote: Your credit card number has not been stolen. Your card can be stolen, bu
t not the number. Confidentiality is violated.