BAIT2023 INTRODUCTION TO INTERNET SECURITY
Tutorial 1
1. Explain the difference between computer security, network security and
internet security by giving an example for each term.
Type of Security Definitions Example
Computer Security generic name for the Information security is
collection of tools designed securing information from
to protect data unauthorized access,
and to thwart hackers modification & deletion
Network Security measures to protect These security devices
data during their block the surplus traffic.
transmission Firewalls, antivirus
scanning devices, and
content filtering devices are
examples of such devices.
Internet Security measures to protect Malicious software comes
data during their in many forms, such as
transmission over a viruses, Trojan horses,
collection of interconnected spyware, and worms.
networks
BAIT2023 INTRODUCTION TO INTERNET SECURITY
2. In both X.800 and RFC4949, security attacks have been classified in terms of
passive attacks and active attacks. What is the difference between the term
passive attack and active attack? Give one example for each term.
Active Attack Different Passive Attack
Modification in Modification Modification in the
information take place. information does not take
place.
danger for Integrity as well Danger Danger for Confidentiality.
as availability.
Due to active attack system Damage While due to passive
is always damaged. attack, there is no harm to
the system.
3. List and briefly define categories of passive and active security attacks. Use
diagrams to explain your answer.
Active Attack
Masquerade – Masquerade attack takes place when one entity
pretends to be a different entity. A Masquerade attack involves one of the
other form of active attacks.
Passive Attack
The release of message content – Telephonic conversation, an
electronic mail message or a transferred file may contain sensitive or
BAIT2023 INTRODUCTION TO INTERNET SECURITY
confidential information. We would like to prevent an opponent from
learning the contents of these transmissions.
4. What is the difference between the term threat and attack? Give one example
for each term.
Threat Different Attack
Comparatively hard to detect Comparatively easy to
detect detect
BAIT2023 INTRODUCTION TO INTERNET SECURITY
5. 7th August 2009: The well-known Twitter and Facebook websites suffered
from a form of attack. Some of the users reported that the access to the
websites became slower and degraded. After these attacks, Facebook was still
working whereas Twitter remained offline for 2 hours.
Source:
http://www.bbc.co.uk/blogs/technology/2009/08/the_day_twitter_stopped.htm
(i) Name this type of attack.
Denial-of-service (DDoS) attack
(ii) Is this attack a passive attack or an active attack? Support your answer
with an explanation.
The users are degraded.
(iii) This type of attack usually attacks on availability of the websites.
From the perspective of security services, describe the term availability.
The property of a system or a system resource being accessible and usable
upon demand by an authorized system entity, according to performance
specifications for the system.
6. Briefly describe the following terms and provide ONE (1) example each.
(i) Security attack.
A means of classifying security attacks, used both in X.800 and
RFC4949, is in terms of passive attacks and active attacks.
Example: Phishing
BAIT2023 INTRODUCTION TO INTERNET SECURITY
(ii) Security service.
Defined by X.800 as: A service provided by a protocol layer of
communicating open systems and that ensures adequate security of
the systems or of data transfers
Defined by RFC 4949 as:
A processing or communication service provided by a system to give a
specific kind of protection to system resources
Example:Data loss prevention
BAIT2023 INTRODUCTION TO INTERNET SECURITY
(iii) Security mechanism.
Security mechanisms are technical tools and techniques that are used
to implement security services. A mechanism might operate by itself,
or with others, to provide a particular service. Examples of common
security mechanisms are as follows: Cryptography. Message digests
and digital signatures.
Example: Authorization