- There is a lot information in our computer
- These data are store in text file &/@ database
- Security is needed to against unauthorized parties
Security Fundamental Principal
CIA
C-confidentiality
I-integriti
A-availability
Type of Attack
- Interruption: somehow disrupt the service being provided by the network
- Interception: eavesdrop on communication meant to be private @ confidental
- Modification: tamper with information @ network resourses
- Fabrication: counterfeit information @ network resources @ services are inserted into the network
No comments:
Post a Comment