1. The document discusses various types of attacks that can compromise computer security systems, including malware infection, software spying, and exploiting system weaknesses.
2. It covers security goals like confidentiality, integrity, and availability that aim to protect information and resources from threats or hazards.
3. Vulnerabilities in security systems that can damage systems or steal data are called exploits, while using exploits to carry out attacks is called hacking.
1. The document discusses various types of attacks that can compromise computer security systems, including malware infection, software spying, and exploiting system weaknesses.
2. It covers security goals like confidentiality, integrity, and availability that aim to protect information and resources from threats or hazards.
3. Vulnerabilities in security systems that can damage systems or steal data are called exploits, while using exploits to carry out attacks is called hacking.
1. The document discusses various types of attacks that can compromise computer security systems, including malware infection, software spying, and exploiting system weaknesses.
2. It covers security goals like confidentiality, integrity, and availability that aim to protect information and resources from threats or hazards.
3. Vulnerabilities in security systems that can damage systems or steal data are called exploits, while using exploits to carry out attacks is called hacking.
1. Piece of code infect your device for damaging is …………………..
2. Software is set on your computer for spying on each action ………………
3. Weakness is in a system and can be exploit ……………… 4. Computer security also known as ………………. And …………………… 5. Computer security aims for ………………............................... from ………. or ……… 6. Security goals are divided into …………………..., ……………… and ………….. (CIA) 7. Confidentiality try to …………… information , keep information …………... , revealing only to …………………… 8. Weakness in security system that can be used to damage the system or steal information is called ………………… 9. Integrity is the information that can be …………. And try to detect or prevent …………….. modification 10. Availability is ………….. to information and resources and services are always available to ……………… users 11. ………... is a possible danger that might make use of a vulnerability 12. An assault on system security or any action compromises the security is ……….. 13. Categories of vulnerabilities if: Corrupted data mean loss of …………………… Leaky mean loss of …………………… Unavailable or very slow mean loss of …………………….. 14. Use of the vulnerability and threats is called ……………… 15. Types of attack are …………… and ………….. 16. ………….. attack affect on system operation while ……….. attack doesn’t affect on system resources 17. ……………… one who is implements attack 18. Types of threats : ………………….. : is unauthorized access to information this threat to (Confidentiality – Integrity – Availability – All)
………………….. : is acceptance of false data
This threat to (Confidentiality – Integrity – Availability – All)
………………….: is interruption of correct operation
This threat to (Confidentiality – Integrity – Availability – All)
……………….. : is unauthorized system control
This threat to (Confidentiality – Integrity – Availability – All) 19. Communication security try to prevent ………… or detect …………… 20. Write the types of attack on each diagram
21. An asset of the system is destroyed or becomes unavailable or disrupting traffic is
…………….. which is an attack on (Confidentiality – Integrity – Availability – All) 22. Faking data or unauthorized party inserts into a system is …………………. which is an attack on (Confidentiality – Integrity – Availability – All) 23. Overhearing over a communication line is …………………… which is an attack on (Confidentiality – Integrity – Availability – All) 24. Corrupting transmitted data or tampering or change data before it reach its destination is ……………. which is an attack on (Confidentiality – Integrity – Availability – All) 25. ………….. attack that the attacker obtaining information without any modification and it is (easy – difficult) to detect 26. Categories of passive attack are …………………….………. And ……………… 27. Categories if active attack are ……………….. , ……………… , …………….. and …………… 28. Release of message is also called ……………. While traffic analysis is called ……… 29. …….…… refers to unauthorized access to data or interception of data 30. ….……… refers to obtaining some other of information by monitoring online traffic 31. In traffic analysis (Spoofing) the attacker can determine the ……..…… and ………... Of the host 32. Modification of data is type of (Passive - Active) attack 33. When an entity pretends to be different entity is (Replay – Masquerade – Modification of message) which is an attack on (Confidentiality – Integrity – Availability – All) 34. Some portions of message are altered is (Replay – Masquerade – Modification of message) which is an attack on (Confidentiality – Integrity – Availability – All) 35. Involves the passive capture of data and retransmission to produce an unauthorized effect (Replay – Masquerade – Modification of message) which is an attack on (Confidentiality – Integrity – Availability – All) 36. Snooping and traffic analysis (spoofing) are attack on (Confidentiality – Integrity – Availability – All) 37. DOS is attack on (Confidentiality – Integrity – Availability – All)