انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

lec 3-1 Security Attacks

Share |
الكلية كلية تكنولوجيا المعلومات     القسم قسم البرامجيات     المرحلة 4
أستاذ المادة زينب عبد الله جاسم المذحجي       26/03/2018 03:15:47
Security Attacks
The network (also computation system) must be ensuring the integrity of data, secrecy of data, and availability of service. And each user should be accesses the network through a single OS, which also includes network interface responsibilities.
• Integrity: means that the assets (data) can be modification (writing, changing, changing status, deleting, and creating) only by authorized parties. (Only Authorized Disclosure)
• Secrecy: means that the assets (data)of a computing systems are accessible (reading, viewing, and printing) only by authorized parties. (Only Authorized Modification)
• Availability: means that the assets (services) are available to authorized parties. An authorized party should not be prevented from accessing those services to which he or she or it has legitimate access. (Not Denial of Services)
There are four kinds of attacks on the security of a computer system or network (also called threats to the security of a computer system or network), as shown in figure (7) and figure (8):
1- Interruption: in an interruption the asset of the system becomes lost or unavailable or unusable. (Non-availabile)
2- Interception: means that some unauthorized party has gained access to an asset. (Unsecred)
3- Modification: if an unauthorized party not only accesses but tampers with an asset, the failure
becomes a modification. (Not Integrity)
4- Fabrication: an unauthorized party might fabricate counter it objects for a computer system
or network. (NotAuthenticity)


المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
الرجوع الى لوحة التحكم