1. Security Attacks
Prof. Neeraj Bhargava
Kapil Chauhan
Department of Computer Science
School of Engineering & Systems Sciences
MDS University, Ajmer
2. 1.Confidentiality: only authorized parties have access to
information
2.Integrity: only authorized parties have write access to
information
3.Availability: authorized access to information when needed
4.Authenticity: identity claims (user, message source) can be
verified
5.Non-repudiation: message exchange can be proved by
sender and receiver
6.Authorization: information / system / resource access
control
Security services
7. Authentication
Verification of an entity’s claimed identity.
In addition to simple signals, authentication events can
include additional information ds (nonces, keys, etc..)