Computer Science, asked by anjaligupta1719, 8 months ago

what can be classified as attacks or misuse and they can exploit network protocols or work as malicious content at the application layer​

Answers

Answered by abhaiasngh
0

Answer:

The security attacks aim to compromise the five major security goals for network security (extended from CIA requirements): Confidentiality, Availability, Authentication, Integrity and Nonrepudiation. To serve these aims, a network attack is commonly composed of five stages [3]:

1.

Preparation and reconnaissance phase including information gathering to discover and identify vulnerabilities/weaknesses to be exploited and tool configuration

2.

Assessing vulnerabilities and potential exploits

3.

Launching the attack

4.

Core attack operations such as confidential data compromises or integrity damages

5.

Post-attack operations such as getting rid of traces and removing/hiding evidence

Similar questions