Describe possible occurrences of each of the main types of security threat (threats to processes, threats to communication channels, denial of service) that might occur in the Internet.
What will be an ideal response?
Threats to processes: without authentication of principals and servers, many threats exist. An enemy could
access other user’s files or mailboxes, or set up ‘spoof’ servers. E.g. a server could be set up to ‘spoof’ a bank’s
service and receive details of user’s financial transactions.
Threats to communication channels: IP spoofing - sending requests to servers with a false source address, man
in-the-middle attacks.
Denial of service: flooding a publicly-available service with irrelevant messages.
You might also like to view...
Examples of ____ computers are portable media players and smartphones.
A. handheld B. tablet C. netbook D. mini-laptop
Are all websites that use HTTPS considered trustworthy?
What will be an ideal response?
________, the feature enabling you to continue typing without pressing Enter, places a soft return at the end of each line
Fill in the blank(s) with correct word
When evaluating formulas, the ____ of parentheses is evaluated first.
A. innermost set B. outermost set C. set that starts farthest to the right D. set that starts farthest to the left