Professional Documents
Culture Documents
Attacks
Vulnerabilities
p Threats
p
p
CS405-Computer Security
n
n
n
By:
Interception
Interruption
Modification
Fabrication
Controls
Dilum Bandara
Dept. of Computer Science & Engineering
University of Moratuwa
1
Attacks
p
p Vulnerabilities
n Is
p Threats
Terminology
n Is
Vulnerability
Terminology
p
Attacks
n
Water
Control
n
n
Security Threats
Interception
Modification
Info.
Desti.
Normal flow
Data
Info.
Source
Interruption
S
Fabrication
Interception
Interception cont
p An
p This
n
n
n
n Confidentiality
p Really
Eavesdropping
Link monitoring
Packet capturing
System compromisation
Cant be avoided
n
n
11
10
Approaches
n
is an attack on
12
Interruption
Interruption cont
p An
p Approaches
p This
n Destruction
n Physical
is an attack on
links
n Availability
n Introduction
of noise
of routing
n Erase of a program or a file
n DoS attacks
p Easily
n Removal
13
Modification
p
n Changing
a record in a database
compromisation
n Making use of delays in communication
n Modify hardware
is an attack on
n System
n Integrity
Can be detected if proper measure are
taken in advance
p Can be detected by both parties
n
Digital signature
Checking ones own work
Dilum Bandara - CSE
15
Fabrication
An unauthorized party inserts counterfeit
(fake) object into the system
p This
16
Fabrication cont
p Approaches
n Adding
p Make
use of IP spoofing
n Spurious
is an attack on
p E-mail
from admin@yahoo.com
p Similar domain names www.yaho.com
n Insertion
n Authenticity
p
14
p Approaches
Modification cont
p This
of hardware
damages to communication
17
18
Passive threats
Interception
Release of message
content
19
4.
20
Easily detectable
Harder to prevent
p Can recover from destruction
p
Active threats
Replay
1.
3.
Masquerading
1.
2.
Traffic analysis
Harder to detect
Prevention is the better than detection
Traffic analysis
p
2.
Modification
DoS
Interruption
Dilum Bandara - CSE
21
Modification
Dilum Bandara - CSE
Fabrication
22