Chapter 1 - 2020
Chapter 1 - 2020
Introduction
Charles P. Pfleeger
Overview (1)
• Early, the bank robberies are more;
Kept large amount of cash, gold & silver, which could not
be traced easily,
Communication & transportation facilities it might be;
― hours before to were informed of a robbery,
― days before they could arrives at the scene of the crime.
A single guard for the night was only marginally effective.
Security Attacks
• Modification
• Snooping • Denial of
release the( • Masquerading Service
)message content • Replaying
• Traffic Analysis • Repudiation
Threats
Types of Attacks
B. Attacks can be categorize into four groups
related to the harm acts;
Interception,
Interruption,
Modification, and
Fabrication.
• These attacks can be grouped into two broads
categories based on their effects on the
system;
Passive attacks and
Active attacks.
Passive and Active Attacks ;
• A passive attack;
Threaten the confidentiality,
Does not modify data or harm the system,
May harm the sender or the receiver,
It is difficult to detect, but can prevent it by
encryption of the data.
• An active attack;
Threaten the integrity and availability,
May change the data or harm the system,
Easer to detect than to prevent,
An attacker can launch them in a variety ways.
Passive and Active Attacks ;
• The following figure depicts these attacks
categories;
Security Attacks
Active Attacks
Passive Attacks:
•Snooping
(release the message
content) Interruption Modification Fabrication
•Traffic Analysis (Masquerade) (denial of
Service-DOS)