Describe possible occurrences of each of the main types of security threat (threats to processes, threats to communication channels, denial of service) that might occur in the Internet.
What will be an ideal response?
Threats to processes: without authentication of principals and servers, many threats exist. An enemy could access other user’s files or mailboxes, or set up ‘spoof’ servers. E.g. a server could be set up to ‘spoof’ a bank’s service and receive details of user’s financial transactions.
Threats to communication channels: IP spoofing - sending requests to servers with a false source address, man- in-the-middle attacks.
Denial of service: flooding a publicly-available service with irrelevant messages.
You might also like to view...
Test whether variable count is greater than 10. If it is, print "Count is greater than 10".
Write Java statements to accomplish each of the tasks:
You can specify the Button(s) and icon to be displayed in a message dialog by using the MessageBoxButtons and constants.
a) MessageIcon b) MessageBoxImages c) MessageBoxPicture d) MessageBoxIcon
A New Certificate Rule allows you to specify the source of trusted software that should be allowed to run without prompting a user
What will be an ideal response?
?What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
A. ?VRRP B. ?OpenFlow C. ?CommonStack D. ?OpenArch