top of page

Subscribe to Wisdom

Thanks for Subscribing!

Writer's pictureDimit Chadha

Security Threats

# Secrecy Threats

Attempts to steal confidential information either by exploiting weaknesses in cryptographic algorithms or by other means


# Integrity Threats

Attempts to alter information with some selfish or malicious intent. Integrity attacks, it should be noted, can also be accidental.


# Availability Threats

Attempts to disrupt a system's normal operations. Availability attacks are also referred to by the recently popularized term, denial of service (DOS) attacks


# Brute Force

Attack typically involves searching every key until the right one unlocks the door. While that may seem like an expensive operation, in reality it is possible to preen the search using specialized tools.


# Trojan Horse

Attack involves planting an enemy as an insider in such a way that it's not apparently noticeable. A computer virus serves as a common Trojan horse example.


# Person-In-Middle

Attack intercepts communication between two parties without their knowledge. They assume that they're communicating normally.


#  Spoofing

The low cost of Web site design and ease with which existing pages can be copied makes it all too easy to create illegitimate sites that appear to be published by established organizations. In fact, con artists have illegally obtained credit card numbers by setting up professional-looking storefronts that mimic legitimate businesses.


# Unauthorized Disclosure

When information is transmitted "in the clear", making it possible for hackers to intercept the transmissions and obtain sensitive information from customers.


#  Data Alteration

The content of a transaction can be intercepted and altered en route, either maliciously or accidentally. User names, credit card, and social security numbers as well as currency amounts; indeed any information sent "in the clear" is all vulnerable to alteration.

3 views0 comments

Recent Posts

See All

Comments


Modern Digital Watch
bottom of page