Professional Documents
Culture Documents
Lecture # 11
Passive attacks
o -eavesdropping on, or monitoring of, transmissions to;
o -obtain message content, or
o -monitor traffic flows
Active attacks-
o Modification of data steam to:
o masquerade of one entity as some other
o reply previous messages
o modify messages in transit
o denial of services
Masquerade
Modification of Message
Traffic analysis
Message contents
Methods of Defense
Encryption
Software controls(access limitation in a database, in os protect each user from other
users)
Hardware controls(smart card)
Policies(frequent changes of password)
Physical controls