Data Security L1
Data Security L1
DATA SECURITY
M.Mahdi
Introduction
2
Physical vulnerabilities
Intruders can break into your server room, can steal backup media and printouts
Natural vulnerabilities
natural disasters and to environmental threats, fire, flood, earthquakes, lightning, dust, humidity, and
uneven temperature
Hardware and software vulnerabilities
Certain kinds of hardware failures can compromise the security of an entire computer system
Media vulnerabilities
Backup media, such as disk packs, tape reels, cartridges, and printouts, can be stolen, or can be
damaged
Emanation vulnerabilities
All electronic equipment emits electrical and electromagnetic radiation
Communications vulnerabilities
Messages can be intercepted misrouted, and forged
Radio transmissions, the basis of wireless interconnections such as IEEE 802.11 (Wi-Fi) or IEEE
802.15 (Bluetooth), are particularly susceptible to surreptitious interception
Human vulnerabilities
The people who administer and use your computer system represent the greatest vulnerability of all
Security Attacks
13
Passive attacks
Passive attacks are in the nature of eavesdropping on, or
monitoring of, transmissions. The goal of the opponent is to
obtain information that is being transmitted
Two types of passive attacks are: release of message
contents and traffic analysis
Active attacks
Active attacks involve some modification of the data
stream or the creation of a false stream
can be subdivided into four categories: masquerade, replay,
modification of messages, and denial of service.
Release of message contents
14
21
Masquerade
تنكر
Replay
22
23
Replay
Modification of messages
24
25
Modification Of message
The denial of service
26
27
Denial Of Service
Notes
28
Computer security
Communications security
Physical security