Question
Attacks:
Passive – attempt to learn or make use of information from the system that does not affect
system resources
• Active – attempt to alter system resources or affect their operation • Insider – initiated by an entity inside the security parameter
• Outsider – initiated from outside the perimeter
Threat Consequences
Unauthorized disclosure is a threat to confidentiality
•Exposure: This can be deliberate or be the result of a human, hardware, or software error
•Interception: unauthorized access to data •Inference: e.g., traffic analysis or use of limited
access to get detailed information
•Intrusion: unauthorized access to sensitive data

Deception is a threat to either system or data integrity
• Masquerade: an attempt by an unauthorized user to gain access to a system by posing as an authorized user
• Falsification: altering or replacing of valid data or the introduction of false data into a file or database. For example, a student may alter his or her grades on a school database.
• Repudiation: denial of sending, receiving or possessing the data.

Usurpation is a threat to system integrity.
• Misappropriation: e.g., theft of service, distributed denial of service attack
• Misuse: security functions can be disabled or thwarted

Disruption is a threat to availability or system
integrity
•Incapacitation: a result of physical destruction of or damage to system hardware
•Corruption: system resources or services function in an unintended manner; unauthorized modification
•Obstruction: e.g. overload the system or interfere with communications

""""""The question is inside the image"""""""

We assume that there are multiple users communicate with each other. However, their communication for data exchange require t
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. different types of attacks can be done which includes

1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks - these occur when an enormous amount of data reception and data service request is done to stop and make errors in the execution by overloading the systems and thus by doing si denying the real users request.

2. Man-in-the-middle attack - in this mode the attacks stays in between the actual sender and receiver to catch and retransmit data the connection will seem to be normal but the third person is interfering in the middle and the adat integrity is lost
3. Phishing and spear-phishing attacks - The phishing attack is a method of sending emails that appear to be from trusted sources prompting users to do something. Spear phishing is a very targeted type of phishing attack where they and create messages that are personal and relevant.

other common includes:

  1. Drive-by attack
  2. Password attack
  3. SQL injection attack
  4. Cross-site scripting (XSS) attack
  5. Eavesdropping attack
  6. Birthday attack
  7. Malware attack

2. These mechanishms can be take into consideration for possible securituy

1. Create a strong password and change regularly

2. Delete the suspicious email and

3. Use antivirus software

4. Use data encryption

5. SSL certificate

6. Use a firewall on your network

7. Use a web application firewall

8. Use virtual private network (VPN)

3. Using the above methods discussed which will be sufficient enough to have a proper defense against most of the common attacks and some targeted attacks such as ransomware may require speific program to detect and correct it.

hope it helps, give a thumbs up

Add a comment
Know the answer?
Add Answer to:
Attacks: Passive – attempt to learn or make use of information from the system that does...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Management information system Please answer the question correctly QUESTION 16 Which of the following is the...

    Management information system Please answer the question correctly QUESTION 16 Which of the following is the most widely used operating system in business? Linux Mac OS Windows Unix 2.5 points    QUESTION 17 Which of the following is an open-source operating system? Unisys Windows Linux Mac OS 2.5 points    QUESTION 18 Which of the following storage types is volatile? RAM ROM PROM All the choices are volatile. 2.5 points    QUESTION 19 Which of the following best describes the...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations....

    Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations. This is a story of a leading vendor of IT outsourcing that decided to outsource one of its own IT functions. More accurately, it relies on software as a service. Siemens AG is a German-based global corporation and one of the world's largest firms. It specializes in electronics and engineering. It employs 475,000 people in 190 countries, and reported revenue of $107.4 billion in...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics...

    what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics mie B. Butts OBJECTIVES After reading this chapter, the reader should be able to do the following: 1. Explore the concept of medicalization as it relates to the societal shift away from physician predominance of the 1970s. 2. Differentiate among the following terms: compliance, noncompliance, adherence, nonadherence, and concordance. 3. Examine cultural views with regard to self-determination, decision making, and American healthcare professionals' values...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT