Question

In: Computer Science

Please list and explain some examples of how network integrity and availability can be compromised?

Please list and explain some examples of how network integrity and availability can be compromised?

Solutions

Expert Solution

Integrity

1) Salami attacks:

These are a series of minor data security attacks that together result in a larger attack.

Example: Extracting a small amount from your bank account which you cannot notice. But when this small amounts of deduction is done from large number of accounts, it will be a huge amount.

2) Data diddling attacks:

It is an unauthorized data alteration. Changing data as it is input into a computer or output.

Example: A person dealing Account section can change your time sheet information before entering to the HR payroll application.

3) Man-in-the-middle attacks:

It is a type of network attack. Here the attacker keeps himself between two devices that are communicating to change the data as it moves.

4) Session hijacking attacks:

It is type of network attack. Here the attacker hacks a computer session to gain unauthorized access to information or services in your computer system.

Avilability

1) DOS:

DOS polularly called as Denial of Service Attacks. It is a attack to a network server with huge number of service requests which cannot handle. Which causes the server to crash.

2) DDOS:

DDOS is known as Distributed Denial of Service Attacks. It is originated from many attacking computers from different geographical regions like DOS.

3) SYN flood attacks:

In this attacker sends many TCPSYN packets to initiate a TCP connected, but never send a SYN - ACK pack back.

4) ICMP flood attacks:

In this the victim computer is sent with many false ICMP packets.


Related Solutions

In each of the following areas, what're two examples of how data accuracy can be compromised...
In each of the following areas, what're two examples of how data accuracy can be compromised by inappropriate choices of the researcher; a. Survey questionnaire design b. Sampling plan for a survey c. Data collection and recording
Define the following terms and security objectives and give examples: Confidentiality Integrity Availability Authentication Authorization
Define the following terms and security objectives and give examples: Confidentiality Integrity Availability Authentication Authorization
Please give me brief definition of porous absorber with some examples, and how we can explain...
Please give me brief definition of porous absorber with some examples, and how we can explain physically the fact that this materiel absorb sound.
Can you explain in some detail how these demand factors(price, quality, availability of substitutes, tastes and...
Can you explain in some detail how these demand factors(price, quality, availability of substitutes, tastes and preferences, future expectation) will change between the short and long-term for legalization of marijuana?
identify at least four examples of how the integrity of the medical record can be violated
identify at least four examples of how the integrity of the medical record can be violated
identify at least four examples of how the integrity of the medical record can be violated
identify at least four examples of how the integrity of the medical record can be violated
Explain how loan guarantee increases capital availability for small business. List and explain 3 types of...
Explain how loan guarantee increases capital availability for small business. List and explain 3 types of loan guarantees. List and explain 3 advantages and 3 disadvantages of loan guarantee programs.
Can someone please explain formation of imines, oximes, hydrazones, phenylhydrazones and some examples, thanks
Can someone please explain formation of imines, oximes, hydrazones, phenylhydrazones and some examples, thanks
Explain what academic integrity is, and explain how you are prepared to meet the academic integrity...
Explain what academic integrity is, and explain how you are prepared to meet the academic integrity standards at your nursing school
Explain how a Merkle tree can be used for integrity of individual piece of a large...
Explain how a Merkle tree can be used for integrity of individual piece of a large data and for data retrievability.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT