The different types of Security Attacks that concern Encryption Includes :
Eavesdropping
Eavesdropping is when an attacker(unauthorised person) read contents of a message that is passed from one party to another intended party.
For example , Tom is sending an email to Jess, and Jason(the attacker) reads the contents and know what Tom is sending Jess. This can be dangerous as what Tom is sending could be confidential. It could include some stuffs which only Jess should be told off. In this case, Jason is performing Eavesdropping by reading contents of the message when he is authorised to do so.
Modification of Messages
Modification of Message happens when an attacker(unauthorised person) change the contents of a message that is passed from one party to another intended party.
For example, Tom is sending an email to Jess, and Jason(the attacker) changes the contents of the message Tom is sending Jess.
The original message from Tom to Jess could be "Transfer 10 Thousand USD into Account number 123-456-789 "
However after Jason changes the contents when he is not authorised to do so, the message could end up to be "Transfer 10 Thousand USD into Account number 999-888-777"
This could end up to be a serious matter.
In Encryption, we will be dealing with the 3 Security Services which will deal with the Security Attacks mentioned above.
Confidentiality - Keeping information Secret, not to be read by a third party
Integrity - Keeping information intact, not to be changed by unauthorized persons
Availability - Making information available to authorized persons.
Eavesdropping
Eavesdropping is when an attacker(unauthorised person) read contents of a message that is passed from one party to another intended party.
For example , Tom is sending an email to Jess, and Jason(the attacker) reads the contents and know what Tom is sending Jess. This can be dangerous as what Tom is sending could be confidential. It could include some stuffs which only Jess should be told off. In this case, Jason is performing Eavesdropping by reading contents of the message when he is authorised to do so.
Modification of Messages
Modification of Message happens when an attacker(unauthorised person) change the contents of a message that is passed from one party to another intended party.
For example, Tom is sending an email to Jess, and Jason(the attacker) changes the contents of the message Tom is sending Jess.
The original message from Tom to Jess could be "Transfer 10 Thousand USD into Account number 123-456-789 "
However after Jason changes the contents when he is not authorised to do so, the message could end up to be "Transfer 10 Thousand USD into Account number 999-888-777"
This could end up to be a serious matter.
In Encryption, we will be dealing with the 3 Security Services which will deal with the Security Attacks mentioned above.
Confidentiality - Keeping information Secret, not to be read by a third party
Integrity - Keeping information intact, not to be changed by unauthorized persons
Availability - Making information available to authorized persons.
Subscribe to:
Post Comments (Atom)
After reading the complete detail I have understood the clear and complete meaning and usage of encryption. The process is highly useful and important in this digital era where most of the information travels through electronic medium.
electronic signatures