CHAPTER 17 NETWORK MANAGEMENT 17-4 Planting viruses 08 www.gxmu.edu.cn
17-4 Planting viruses www.gxmu.edu.cn CHAPTER 17 NETWORK MANAGEMENT
CHAPTER 17 NETWORK MANAGEMENT 17-4 Other types of security threats include www.gxmu.edu.cn
17-4 Other types of security threats include ⚫Physical damage ⚫Nonmalicious disruptions ⚫Disasters www.gxmu.edu.cn More Samples ... CHAPTER 17 NETWORK MANAGEMENT
CHAPTER 17 NETWORK MANAGEMENT 17-4 Attacks Services and mechanisms Security Attack: Any action that compromises, the security of information Security Mechanism: It is designed to detect, prevent, or recover from a security attack Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms www.gxmu.edu.cn
www.gxmu.edu.cn 17-4 Attacks, Services and Mechanisms Security Attack: Any action that compromises, the security of information. Security Mechanism: It is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms. CHAPTER 17 NETWORK MANAGEMENT
CHAPTER 17 NETWORK MANAGEMENT 17-4 Security Attacks Information source destination (a) Normal flow (b)Interruption (c) Interception (d) Modification (e) Fabrication www.gxmu.edu.cn
www.gxmu.edu.cn 17-4 Security Attacks CHAPTER 17 NETWORK MANAGEMENT
CHAPTER 17 NETWORK MANAGEMENT 17-4 Passive and active attacks Passive attacks No modification of content or fabrication Eavesdropping to learn contents or other information Active attacks Modification of content and/or participation in communication to Impersonate legitimate parties Modify the content in transit Launch denial of service attacks www.gxmu.edu.cn
www.gxmu.edu.cn 17-4 Passive and active attacks Passive attacks No modification of content or fabrication Eavesdropping to learn contents or other information. Active attacks Modification of content and/or participation in communication to •Impersonate legitimate parties •Modify the content in transit •Launch denial of service attacks CHAPTER 17 NETWORK MANAGEMENT