Page 46 - CITS - Computer Software Application -TT
P. 46

COMPUTER SOFTWARE APPLICATION - CITS

























              Attackers might use techniques like packet sniffing to capture data packets as they travel across the network.
              The intercepted data might contain sensitive information, such as passwords, financial details, or confidential
              messages.
           2  Traffic Analysis: Traffic analysis attacks focus on observing patterns in communication, even without directly
              accessing the content of the messages. Attackers analyze factors like message frequency, size, timing, and
              the parties involved to deduce information about the communication. For example, an attacker might infer the
              relationship between two individuals by analyzing the frequency and timing of their communication.
           Difference Between Active & Passive Attack


                              Active Attack                                   Passive Attack
            In an active attack, Modification in information takes   While in a passive attack, Modification in the
            place.                                           information does not take place.

            Active attack is a danger to integrity as well as   Passive attack is a danger to Confidentiality.
            availability.
            In an active attack, attention is on prevention.  While in passive attack attention is on detection.

            Due to active attacks, the execution system is always  While due to passive attack, there is no harm to the
            damaged.                                         system.

           Services- In the context of computer networks, services refer to functions or capabilities provided by networked
           systems to users or other systems. These services facilitate communication, resource sharing, and other network
           activities. Examples of network services include:
           •  File Sharing: Allowing users to access and share files on a network.
           •  Email: Sending and receiving electronic messages.
           •  Web Hosting: Hosting websites accessible over the internet.
           •  Domain Name System (DNS): Resolving domain names to IP addresses.

           •  Remote Access: Accessing a computer or network from a remote location.
           •  Directory Services: Managing and organizing information about resources in a network.
           •  Authentication and Authorization: Verifying user identities and controlling access to resources.
           Mechanisms: Mechanisms in cybersecurity refer to the tools, technologies, and practices used to protect systems
           and networks from attacks and maintain their security. Some common security mechanisms include:
           •  Firewalls: Hardware or software devices that monitor and control incoming and outgoing network traffic based
              on predetermined security rules.
           •  Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Monitoring and responding
              to suspicious network activities.
           •  Encryption: Transforming data into a secure format to prevent unauthorized access during transmission or
              storage.


                                                           33

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   41   42   43   44   45   46   47   48   49   50   51