Wednesday 9 January 2019

Security Attacks: Cryptography

Attacks can be of two types.


  1. Active attacks :
           - Attempts to change and modify the information.
           - Easy to detect.
    
     2.  Passive attacks :

            - Attempts to obtain the information and not to modify.
            - Difficult to detect.

Passive Attacks

1. Release of Message Content.
      - Transmitted data may contain confidential information.
      - Monitors / listens the information.

2. Traffic Analysis.
       - Monitoring and observing the pattern of data transmission.


Active Attacks

1. Masquerade
         - One entity pretends to be a different entity.

2. Replay 
       - Passive capture of a data unit.
       - And it is retransmitted later.

3. Modification of Message
  • A legitimate message is altered.
  • And then it is retransmitted later.
4. Denial of Service.
  • Break down a communication system or network.
  • And making it unavailable to its intended users.

0 Comments:

Post a Comment

Popular Posts

Categories

AI (24) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (101) C (77) C# (12) C++ (82) Course (60) Coursera (169) coursewra (1) Cybersecurity (22) data management (9) Data Science (73) Data Strucures (6) Deep Learning (9) Django (6) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (5) flutter (1) FPL (17) Google (17) Hadoop (3) HTML&CSS (46) IBM (19) IoT (1) IS (25) Java (92) Leet Code (4) Machine Learning (39) Meta (18) MICHIGAN (4) microsoft (3) Pandas (3) PHP (20) Projects (29) Python (702) Python Coding Challenge (136) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (2) Software (17) SQL (38) UX Research (1) web application (8)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses