Chapter 1
Chapter 1
Security attack
Not Sufficient!!
Internet
Internet
The Definition of Computer Security
Alice Bob
data, control
channel
messages
Trudy
Computer Security and Privacy/Attacks
Categories of Attacks
• Interruption: An attack on availability
• Interception: An attack on confidentiality
• Modification: An attack on integrity
• Fabrication: An attack on authenticity
Categories of Attacks/Threats (W.
Stallings)
Source
Destination
Normal flow of information
Attack
Interruption Interception
Modification Fabrication
Classify Security Attacks as
• Passive attacks - eavesdropping on, or monitoring
of, transmissions to:
– obtain message contents, or
– monitor traffic flows
• Active attacks – modification of data stream to:
– masquerade of one entity as some other
– replay previous messages
– modify messages in transit
– denial of service
Eavesdropping - Message Interception
(Attack on Confidentiality)
• Unauthorized access to information
• Packet sniffers and wiretappers
• Illicit copying of files and programs
A B
Eavesdropper
Integrity Attack - Tampering With Messages
A B
Perpetrator
Authenticity Attack - Fabrication
• Unauthorized assumption of other’s identity
• Generate and distribute objects under this
identity
A B
Masquerader: from A
Attack on Availability
• Destroy hardware (cutting fiber) or software
• Modify software in a subtle way (alias commands)
• Corrupt packets in transit
A B