what can be classified as attacks or misuse and they can exploit network protocols or work as malicious content at the application layer
Answers
Answered by
0
Answer:
The security attacks aim to compromise the five major security goals for network security (extended from CIA requirements): Confidentiality, Availability, Authentication, Integrity and Nonrepudiation. To serve these aims, a network attack is commonly composed of five stages [3]:
1.
Preparation and reconnaissance phase including information gathering to discover and identify vulnerabilities/weaknesses to be exploited and tool configuration
2.
Assessing vulnerabilities and potential exploits
3.
Launching the attack
4.
Core attack operations such as confidential data compromises or integrity damages
5.
Post-attack operations such as getting rid of traces and removing/hiding evidence
Similar questions