انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

Lecture 3 of Computing Security 1 Course for 4th class

Share |
الكلية كلية العلوم للبنات     القسم قسم الحاسبات     المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي       12/11/2017 06:03:33
Lecture 3 overview:
• Security Attacks
• Security Mechanisms
• A Model for Network Security
8. Security Attacks: General Introduction
it has become essential to protect useful information from malicious
activities such as attacks. Attacks are typically categorized based on the
action performed by the attacker. An attack, thus, can be passive or
active.
Passive Attacks: The main goal of it is to obtain unauthorized access to
the information. For example, actions such as intercepting and
eavesdropping on the communication channel can be regarded as
passive attack. These actions are passive in nature, as they neither affect
information nor disrupt the communication channel. Passive information
attack is thus more dangerous than stealing of goods, as information theft
may go unnoticed by the owner.
Figure (5): Passive Attack.
Computing Security 1 Lecture 3
Page 2
Active Attacks: involve changing the information in some way by
conducting some process on the information. For example,
• Modifying the information in an unauthorized manner.
• Initiating unintended or unauthorized transmission of information.
• Alteration of authentication data such as originator name or
timestamp associated with information.
• Unauthorized deletion of data.
• Denial of access to information for legitimate users (denial of service).
Figure (6): Active Attack.
Cryptography provides many tools and techniques for implementing
cryptosystems capable of preventing most of the attacks described above.

المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
الرجوع الى لوحة التحكم