To apply as a writer on this blog, Email me on [email protected] OR [email protected]

Wednesday, January 5, 2011

Different Type Of ATTACKS

A security system is s system to defend our assets from the attacks.In the physical world,these attacks are carried out at the weak points in the defense system.Likewise in the electronic world,attacks are carried out at the point of vulnerability.When the vulnerability is exploited for some interest or selfish motive,it is an attack of hacking on the system. There are basically 4 types of attacks.
(a) Interception :- An unauthorized party gaining access to an asset will be part of this attack.This attack on confidentiality like unauthorized copying of files or tapping a conversation between parties.Some of the sniffing attacks fall in this category.
(b) Modification :- An unauthorized party gaining control of an asset and tampering with it is part of this attack.This is an attack in integrity like changinf the content of a message being transmitted through the network. (c) Fabrication :- An unauthorized party inserts counterfeited objects into the system;for example,impersonating someone and inserting a supirious message into the network. (d) Interruption :- An asset is destroyed or made unusable which is going to be tranmiteed from the information source to the information destination by inputing some break wall into the network which will not allow destionation to receive the packets.
GUEST POST BY Chintan
---Do you want to share you views?? Just leave a comment here. you can also drop an email on [email protected]

2 Visitor Reactions & Comments:

seenu said...

Great to see this blog again. Very happy to see this

Amarjit Singh said...

@ Seenu Thanks & keep visiting