FSS CH-1
FSS CH-1
Chapter One
Introduction to Software Security
Kedra Hussen
1
Terminologies
• Plaintext: Intelligible data that has meaning and can be read or acted upon without the
application of decryption. Also known as cleartext.
• Vulnerability: An inherent weakness that may enable threat to harm system or networks.
Ex: Eavesdropping
• Active Attacks: attempts to alter or modify system resources.
• What is Threat?
It is a potential violation of security.
• Classes of Threats
1. Interruption (Disruption) – prevention of correct operation. Ex: DoS attack
3. Modification – an unauthorized party not only gains access to but modify an asset. Ex:
Spoofing
• Not integral
• Insider Attacks
Security Goals and Principles
• Security Goals
There are 3 main goals known as CIA.
• Wiretapping
• DdoS is a cybercrime in which the attacker floods a server with internet traffic
o More difficult to stop than a DoS attack because DDoS originates from
different sources
3. Unacceptable Web Browsing
• Unacceptable use can include: