#Â Secrecy Threats
Attempts to steal confidential information either by exploiting weaknesses in cryptographic algorithms or by other means
#Â Integrity Threats
Attempts to alter information with some selfish or malicious intent. Integrity attacks, it should be noted, can also be accidental.
#Â Availability Threats
Attempts to disrupt a system's normal operations. Availability attacks are also referred to by the recently popularized term, denial of service (DOS) attacks
#Â Brute Force
Attack typically involves searching every key until the right one unlocks the door. While that may seem like an expensive operation, in reality it is possible to preen the search using specialized tools.
#Â Trojan Horse
Attack involves planting an enemy as an insider in such a way that it's not apparently noticeable. A computer virus serves as a common Trojan horse example.
#Â Person-In-Middle
Attack intercepts communication between two parties without their knowledge. They assume that they're communicating normally.
#Â Â Spoofing
The low cost of Web site design and ease with which existing pages can be copied makes it all too easy to create illegitimate sites that appear to be published by established organizations. In fact, con artists have illegally obtained credit card numbers by setting up professional-looking storefronts that mimic legitimate businesses.
#Â Unauthorized Disclosure
When information is transmitted "in the clear", making it possible for hackers to intercept the transmissions and obtain sensitive information from customers.
#Â Â Data Alteration
The content of a transaction can be intercepted and altered en route, either maliciously or accidentally. User names, credit card, and social security numbers as well as currency amounts; indeed any information sent "in the clear" is all vulnerable to alteration.
Comments