This chapter discusses cybersecurity principles, threats, and attacks. It introduces the principles of confidentiality, availability, and integrity which are goals of cybersecurity. Threats to security are discussed like viruses, worms, intruders, and insiders which can potentially cause harm. Different types of attacks are covered such as active attacks like masquerade, replay, and denial of service and passive attacks that involve monitoring traffic or releasing message content without altering the system.
4. • Confidentiality:- cybersecurity ensure that the information
is secured and it is accessible only to authorized user and
prevent disclosure of information to unauthorized user.
• Availability:- Ensure that resource are available to the
authorized anytime without any interrupt.
• Integrity:- Cybersecurity efforts should ensure information
remains accurate, consistent and not subject to
unauthorized modification.
5. Threats to Security
• What is threat?
• Types of threats
• Virus
• Worms
• Intruders
• Insiders
Threat is a potential cause of an incident that may result in
harm of systems and organization.
6. • Virus:- Virus means a malicious harmful program for
computer system. Almost all virus are attached to file
through the virus enters to your system and cause harm.
• Worm:- Worm is similar to virus. Worm spread from
computer to computer. It has capability to travel without
any human action.
• Intruders:- A person who try’s to access data without any
permission is known as intruder.
• Insiders:- Insiders are more dangerous than intruders
because they have knowledge of system and also know the
internal threats to system.
7. ATTACKS
Types of attacks
• Active attack
- Masquerade
- Replay
- Denial of Service
• Passive attack
- The release of message content
- Traffic analysis
8. • Active attack
a) An Active attack attempts to alter system resources or effect their
operations.
• Masquerade:-
• Replay:-
9. • Denial of Service:-
• Passive attack
a) A Passive attack attempts to learn or make use of information from
the system but does not affect system resources.
10. • The release of message content:-
• Traffic analysis:-