Page 46 - CITS - Computer Software Application -TT
P. 46
COMPUTER SOFTWARE APPLICATION - CITS
Attackers might use techniques like packet sniffing to capture data packets as they travel across the network.
The intercepted data might contain sensitive information, such as passwords, financial details, or confidential
messages.
2 Traffic Analysis: Traffic analysis attacks focus on observing patterns in communication, even without directly
accessing the content of the messages. Attackers analyze factors like message frequency, size, timing, and
the parties involved to deduce information about the communication. For example, an attacker might infer the
relationship between two individuals by analyzing the frequency and timing of their communication.
Difference Between Active & Passive Attack
Active Attack Passive Attack
In an active attack, Modification in information takes While in a passive attack, Modification in the
place. information does not take place.
Active attack is a danger to integrity as well as Passive attack is a danger to Confidentiality.
availability.
In an active attack, attention is on prevention. While in passive attack attention is on detection.
Due to active attacks, the execution system is always While due to passive attack, there is no harm to the
damaged. system.
Services- In the context of computer networks, services refer to functions or capabilities provided by networked
systems to users or other systems. These services facilitate communication, resource sharing, and other network
activities. Examples of network services include:
• File Sharing: Allowing users to access and share files on a network.
• Email: Sending and receiving electronic messages.
• Web Hosting: Hosting websites accessible over the internet.
• Domain Name System (DNS): Resolving domain names to IP addresses.
• Remote Access: Accessing a computer or network from a remote location.
• Directory Services: Managing and organizing information about resources in a network.
• Authentication and Authorization: Verifying user identities and controlling access to resources.
Mechanisms: Mechanisms in cybersecurity refer to the tools, technologies, and practices used to protect systems
and networks from attacks and maintain their security. Some common security mechanisms include:
• Firewalls: Hardware or software devices that monitor and control incoming and outgoing network traffic based
on predetermined security rules.
• Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Monitoring and responding
to suspicious network activities.
• Encryption: Transforming data into a secure format to prevent unauthorized access during transmission or
storage.
33
CITS : IT&ITES - Computer Software Application - Lesson 01-17