Computer Science, asked by mathewalexalex2244, 12 hours ago

Define the type of security attack in each of the following cases: [3]
a. A student breaks into a professor’s office to obtain a copy of the next day’s test.
b. A student gives a check for $10 to buy a used book. Later she finds that the
check was cashed for $100.
c. A student sends hundreds of e-mails per day to another student using a phony
return e-mail address

Answers

Answered by shilpa85475
5

a.confidential attack.

b. integrity attack.

c. Denial of service attack.

Explanation:

A student breaks into a professor's office to obtain a copy of the next day's test This is a type of confidentiality attack because an unauthorized student intrudes into the professor's room to obtain personal information.

b. A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100.

This is a type of integrity attack because the check has been altered by a student, who does not have permission to do that. This questions the person’s honesty.

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Answered by vatsalpatil1308
0

Answer:

(i)passive security attack

(ii)fraud attack, active security attack

(iii)Denial of Service attack

Explanation:

(i) A student breaks into a professor's office to obtain a copy of the next day's test. This is an example of a passive security attack, specifically an unauthorized access to information.

(ii) A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100. This is an example of a fraud attack, active security attack because the attacker(s) actively altered the check to cash it for more money.

(iii) A student sends hundreds of e-mails per day to another student using a phony return e-mail address. This is an example of a Denial of Service attack, active security attack as the attacker(s) actively attempt to overwhelm a target with a large amount of traffic and make it unavailable for legitimate use.

Similar questions