Professional Documents
Culture Documents
Tapping
Disclosure
Amendment
Fabrication
Denial
Tapping: Unauthorized use of service
Disclosure: Unauthorized disclosure of information
AA B
B
X
Amendment: Unauthorized alteration or
deletion of information
AA B
B
X
Fabrication: Unauthorized fabrication of
information
AA B
B
X
Denial: Denial of service to authorized
user
AA B
B
X
ATTACKS ON SECURITY
1) AUTHENTICATION
Guess or steal password
May find password by trial & error method
Dummy Log-in program
Can use unattended terminal
Vendor supplied password
2) BROWSING
Accessing confidential files by using internet.
ATTACKS ON SECURITY CONT…
3) TRAP DOORS
START
READ
-
-
- Trap door
EDIT
-
-
-
-
Write Trap door
-
-
-
END
ATTACKS ON SECURITY CONT…
4) LINE TAPPING
Tapping of communication line by using different
hardware & techniques. (Security threats)
5) ELECTRONIC DATA CAPTURE
Wire taps
Pick up the screen radiation
6) LOST LINE
7) IMPROPER ACCESS CONTROLS
Access controls are not properly planned
ATTACKS ON SECURITY CONT…
8) WASTE RECOVERY
Deleted files can be recovered by penetrator.
9) ROGUE SOFTWARE
Variety of S/W programs like virus, worms can
create problems.
10) THE COVERT CHANNEL
Despite of restrictions, unauthorized data transfer
may still occur because of unprotected signaling
devices.
11) INVALID PARAMETERS
Security can be violated by passing invalid
parameters.
COMPUTER WORM
1) Append
2) Replace
3) Insert
4) Delete
5) Redirect
VIRUS
1) Virus Detection: Virus detection program checks
for the integrity of the binary files. They monitor
certain memory & I/O devices.
2) Virus Removal: These programs scans the disk
files for known virus patterns & removes them.
3) Virus Prevention: Buy official, legal copies of
software from reliable sources. Frequent Back
ups & running monitoring programs.