Software With Problems Metric Confusion Caused Nasas 125 Million Mars Orbiter Loss Virtually All of Information Security Is Implemented in Software
Software With Problems Metric Confusion Caused Nasas 125 Million Mars Orbiter Loss Virtually All of Information Security Is Implemented in Software
Ex:
• Illicit copying of program or data
• Network wiretapping
Interruption
◦ Asset of the system becomes lost, unavailable, or
unusable.
Ex:
◦ malicious destruction of a hardware device
◦ Erasure of a program or data file
◦ malfunction of an operating system (can’t find a
disk file.)
Modification
◦ unauthorized party not only accesses but also
alter the asset
Ex:
◦ Change the values in a database
◦ Alter a program to performs deferent
computation
◦ modify data being transmitted electronically.
Fabrication
◦ The intruder may insert transactions or data to a
network communication system.
◦ Add records to an existing database.
Human
Another System
◦ Method:
How : Skill, knowledge, tools
◦ Opportunity :
When : suitable time for attack
◦ Motive :
Why : Reason for the attack
Passive Attack
◦ Attempts to learn or make use of information from
the system
◦ Does not affect system resources
Release the content
Traffic analysis
Active Attack
◦ Attempts to alter system resources or affect their
operation.
◦ Denial of service
◦ Modification of content
Protective measures against attacks
Availability
o legitimate users may able to access or modify data
o Present of information when it is needed
Integrity
o Accuracy of data
Security of Data.
Figure 1-6 Multiple Controls.
Computer Crime
◦ Any crime involving a computer
Hackers
◦ Access computer systems non maliciously
Crackers
◦ Access computer systems maliciously