22
Security Threats/Attacks BY :: Prof Yogesh Doulatramani VIT College

3 (IMP) Security Threats(Attacks)

Embed Size (px)

DESCRIPTION

network security

Citation preview

Page 1: 3 (IMP) Security Threats(Attacks)

Security Threats/Attacks

• BY ::Prof Yogesh Doulatramani

VIT College

Page 2: 3 (IMP) Security Threats(Attacks)

Security Attacks

Informationsource

Informationdestination

Normal Flow

2

Page 3: 3 (IMP) Security Threats(Attacks)

Security Attacks

Informationsource

Informationdestination

Interruption

Attack on availability(ability to use desired information or

resources)3

Page 4: 3 (IMP) Security Threats(Attacks)

Security Attacks

Informationsource

Informationdestination

Interception

Attack on confidentiality

(concealment of information)4

Page 5: 3 (IMP) Security Threats(Attacks)

Security Attacks

Informationsource

Informationdestination

Fabrication

Attack on authenticity(identification and assurance of origin of information)

5

Page 6: 3 (IMP) Security Threats(Attacks)

Security Attacks

Informationsource

Informationdestination

Modification

Attack on integrity(prevention of unauthorized changes)Network

Security 6

Page 7: 3 (IMP) Security Threats(Attacks)

Threats and Attacks

• Threat - a potential for violation of security or a possible danger that might exploit a vulnerability

• Attack - an assault on system security- an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system.

7

Page 8: 3 (IMP) Security Threats(Attacks)

Security Security Threats/AttacksThreats/Attacks

8

Page 9: 3 (IMP) Security Threats(Attacks)

Security AttacksSecurity Attacks

• Interruption: This is an attack on availability– Disrupting traffic– Physically breaking communication

line• Interception: This is an attack on

confidentiality– Overhearing, eavesdropping over a

communication line

9

Page 10: 3 (IMP) Security Threats(Attacks)

Security Attacks (continued)

• Modification: This is an attack on integrity– Corrupting transmitted data or

tampering with it before it reaches its destination

• Fabrication: This is an attack on authenticity– Faking data as if it were created by a

legitimate and authentic party

10

Page 11: 3 (IMP) Security Threats(Attacks)

Examples of Threats

• Snooping intercepting information (“passive” wiretapping)

• Modification or alteration of information by “active” wiretapping

• Masquerading or spoofing• Repudiation of origin• Delay or denial of service

11

Page 12: 3 (IMP) Security Threats(Attacks)

Safeguards and Vulnerabilities

• A Safeguard is a countermeasure to protect against a threat

• A weakness in a safeguard is called a vulnerability

12

Page 13: 3 (IMP) Security Threats(Attacks)

Passive and Active Attacks• Security attacks are usually classified

as passive or active:• Passive- attempts to learn or make

use of information from the system, but does not affect system resources.

• Active- attempts to alter system resources or affect their operation.

13

Page 14: 3 (IMP) Security Threats(Attacks)

Passive and active attacks• Passive attacks- goal to obtain information

– No modification of content or fabrication– Eavesdropping to learn contents or other

information (transfer patterns, traffic flows etc.) • Release of message contents• Traffic analysis

• Active attacks- modification of content and/or participation in communication to

• Impersonate legitimate parties (Masquerade)• Replay or retransmit• Modify the content in transit• Launch denial of service attacks

14

Page 15: 3 (IMP) Security Threats(Attacks)

15

Summary of Passive and Active Threats

Page 16: 3 (IMP) Security Threats(Attacks)

Passive Attacks

16

Page 17: 3 (IMP) Security Threats(Attacks)

Passive Attacks

17

Page 18: 3 (IMP) Security Threats(Attacks)

Active Attacks

18

Page 19: 3 (IMP) Security Threats(Attacks)

Active Attacks

19

Page 20: 3 (IMP) Security Threats(Attacks)

20

Passive Threats

• Release of a message contents: Contents of a message are read.> A message may be carrying sensitive or

confidential data.• Traffic analysis: An intruder makes inferences by observing

message patterns.> Can be done even if messages are

encrypted.> Inferences: location and identity of hosts.

Page 21: 3 (IMP) Security Threats(Attacks)

21

Active Threats

• Masquerade: An entity pretends to be some other

entity. Example: An entity captures an

authentication sequence and replays it later to impersonate the original entity.

• Replay:Involves capture of a data unit and

its retransmission to produce an unauthorized effect.

Page 22: 3 (IMP) Security Threats(Attacks)

22

Active Threats

• Modification of messages:A portion of a legitimate message has

been altered to produce an undesirable effect.

• Denial of service:Inhibits normal use of computer and

communications resources.> Flooding of computer network.>Swamping of CPU or a server.