Lect-4_2
Lect-4_2
Lecture 4
Dr. Mahmoud Y. Shams
Introduction
What’s meant by Data Security?
It refers to the control measures adopted by an organization
aimed at consistently securing its owned electronic data files.
Whether they are data files or program files, and protecting
them from two main types of risks:
Risks of unauthorized access.
Risks of loss or damage.
Types of Attacks on Information
Security:
1. Interruption
2. Interception
3. Modification
4. Fabrication
First: Interruption
It refers to attacking the information between the
source of the information and the recipient of the
information.
The goal of this attack is to destroy the
information or make it unavailable or unusable.
Examples:
Destroying the hard drive
Information
Source of Recipient of
Information Information
The Natural Flow of Information
Information
Source of Recipient of
Information Information
Interruption
Second: Interception
It refers to an unauthorized entity accessing the
information.
This entity can be either a person or a computer program.
The goal of this entity is to attack the confidentiality and
privacy of the information.
Examples:
Accessing network data
Unauthorized copying of files and
programs
Second: Interception
Information
Source of Recipient of
Information Information
Unauthorized
Entity
Third: Modification
Modification represents an attack on the integrity and
accuracy of the information.
An unauthorized entity tampers with the information.
Examples:
Changing values in data files
Modifying a program to perform
differently
Altering the content of messages
Third: Modification
Source of
Recipient of
Information
Information
Information
Unauthorized
Entity
Fourth: Fabrication
This type of attack targets the authenticity
and identity of the user.
An unauthorized entity introduces forged
items into the system.
Examples:
Injecting forged messages into
the network.
Adding records to a file.
Fourth: Fabrication
Source of Recipient of
Information Information
Unauthorized
Entity
Threats to Information Security
Attacks on information security are classified into:
Passive Attacks: These involve eavesdropping on
information and monitoring the communication
without modifying the transmitted data.
There are two types of passive attacks:
Identifying the contents of the message, such as a
someone else.
Replying: Capturing data and then resending it to
cause an unauthorized effect.
Message Modification: Altering part of a legitimate
message to create an unauthorized effect.
Denial of Service (DoS): Preventing the normal use
Message Message
Secure Secure
Conversion Communication Conversion
Process Channel Process
Secret Secret
Information Information
Interceptor
Network Security Model
A message is sent from one party to another over the
network, where both parties cooperate to exchange the
message.
The communication channel is established by the two main
parties in such a way that:
The process involves converting the information to be
transmission process.
Basic roles of the network
security model
There are four basic roles in designing a security service:
Designing algorithms to perform the lock
process related to message conversion.
Generate confidential information used by the
algorithm.
Find ways to distribute and share confidential
information.
Determine the protocol used by the main
parties to make the use of algorithms and
confidential information.