Define the type of security attack in each of the following cases: [3]
a. A student breaks into a professor’s office to obtain a copy of the next day’s test.
b. A student gives a check for $10 to buy a used book. Later she finds that the
check was cashed for $100.
c. A student sends hundreds of e-mails per day to another student using a phony
return e-mail address
Answers
a.confidential attack.
b. integrity attack.
c. Denial of service attack.
Explanation:
A student breaks into a professor's office to obtain a copy of the next day's test This is a type of confidentiality attack because an unauthorized student intrudes into the professor's room to obtain personal information.
b. A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100.
This is a type of integrity attack because the check has been altered by a student, who does not have permission to do that. This questions the person’s honesty.
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
Answer:
(i)passive security attack
(ii)fraud attack, active security attack
(iii)Denial of Service attack
Explanation:
(i) A student breaks into a professor's office to obtain a copy of the next day's test. This is an example of a passive security attack, specifically an unauthorized access to information.
(ii) A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100. This is an example of a fraud attack, active security attack because the attacker(s) actively altered the check to cash it for more money.
(iii) A student sends hundreds of e-mails per day to another student using a phony return e-mail address. This is an example of a Denial of Service attack, active security attack as the attacker(s) actively attempt to overwhelm a target with a large amount of traffic and make it unavailable for legitimate use.