LEC Two
LEC Two
Computer Security
RIT 212
Dani Mfungo
Security Attacks/Hacking
Use of a computer or any digital device to
gain unauthorized access to data
• Interruption: This is an attack on availability
• Interception: This is an attack on confidentiality
• Modification: This is an attack on integrity
• Fabrication: This is an attack on authenticity
Security attacks/Hacking