Professional Documents
Culture Documents
Introduction To Security Sevices, Attacks and Service Mechanism
Introduction To Security Sevices, Attacks and Service Mechanism
3 / 29
Outline
Introduction
Security Attacks
2 / 29
Introduction
4 / 29
Introduction
5 / 29
Introduction
6 / 29
Introduction
7 / 29
Security Attacks
8 / 29
Security Attacks
9 / 29
Security Attacks
10 / 29
Security Attacks: Threat to Confidentiality
11 / 29
Security Attacks: Threat to Integrity
12 / 29
Security Attacks: Threat to Availability
13 / 29
1.1
1.2
1.3
1.1
1.2
Passive Versus Active Attacks
1.3
Currently Popular Security Attacks
I Malware
I Phishing
I Man-in-the-middle attack
I Denial-of-service
I SQL injection
I Zero-day exploit
14 / 29
Malware
15 / 29
Phishing
16 / 29
Man-in-the-middle attack
17 / 29
Denial-of-service
18 / 29
SQL injection
19 / 29
Zero-day exploit
20 / 29
Services and Mechanisms
21 / 29
Services and Mechanisms
22 / 29
Security Services
23 / 29
Security Mechanisms
24 / 29
Security Mechanisms
25 / 29
Security Mechanisms
26 / 29
Security Mechanisms
27 / 29
Relationship between Security Services and Security
Mechanisms
28 / 29
TECHNIQUES
Cryptography
Steganography
1.1
Cryptography
1.2
Steganography
1.3
END
29 / 29