Different Types of Attacks


Different Types of Attacks


An attack is any malicious or accidental disruption in the confidentially, integrity, or availability of information and network resources. Attacks can come from many places, electronic, physical, or human. Electronics attacks may come from the external network (Internet) or the internal network (Intranet); physical attacks can come in the form of hardware and equipment sabotage or theft, and human attacks most often come in the form of social engineering. Some of the attacks identify and evaluate in this paper are: spoofing, replays attacks, access attack suppress–relay, and source and repudiation attack. Spoofing is when the attackers attempts to appear to be someone else, usually an authentic user. The phenomenon of Web spoofing or ... Show more content on Helpwriting.net ...Website defacements are a common form of modification attack. Repudiation attack is the main application layer level attack repudiation refers to the rejection or attempted denial by a node involved in a communication of having contributed in a part or the entire communication. For example, is someone access your email account and inflammatory information to other under the guise of one of your top managers. This information might prove humiliation to your company and possibly do irreparable harm. This type of attack is easy to accomplish because most email systems do not check outbound email for validity. Data encryption and decryption have become increasingly important as more people are communicating over the internet. Although cryptology is not new, the demand for this technology has soared as its usefulness for security purposes has become more evident. Cryptology involves converting original messages into non–readable formats and plays an important role in keeping data safe while it is in transit (Agrawal & Mishra, 2012). Two popular forms of cryptology are symmetric and asymmetric. Symmetric cryptology–also known as single key encryption–has been in existence for several decades. It is the most widely used. Symmetric encryptions consist of five components: plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. Additionally, in order for the


... Get more on HelpWriting.net ...


No comments:

Post a Comment

sample term paper about information technology

@page { size: auto; margin: 0mm; } html { background-color: #FFFFFF; margin: 0px; } body { margin: 1mm 1mm 1mm 1mm; } ...