Chapter one
Chapter one
An active attack may change the data and harm the system.
Attacks that threatens the integrity and availability are
active attacks . Active attacks are normally easier to detect
than to prevent, because an attacker can launch them in a
variety of ways.
v. Access Control:
This service provides protection against unauthorized access to data. The
term access in this definition is very broad and can involve reading,
writing, modifying, executing programs and so on.
ii. Steganography
The word Steganography with origin in Greek, means ‘covered writing ’ in contrast
with cryptography which means “secret writing”.
Cryptography means concealing the content of a message by enciphering;
steganography means concealing the message itself by covering it with
something else.
Our discussion is mostly about cryptography, not the steganography.
Security Attack
Any action that compromises the security of
information.
Security Mechanism
A mechanism that is designed to detect, prevent, or
recover from a security attack.
Security Service
A service that enhances the security of data
processing systems and information transfers.
Makes use of one or more security mechanisms.
We can seek to
prevent it, by blocking the attack or closing the vulnerability
deter it, by making the attack harder but not impossible
deflect it, by making another target more attractive (or this one less so)
detect it, either as it happens or some time after the fact
recover from its effects