Explain the diffrent types of security attacks, Computer Networking

Q. Explain the diffrent types of Security Attacks?

Types of Security Attacks

211_Explain the diffrent types of Security Attacks.png

Passive Threats:

- Traffic Analysis and

- Release of Message Contents

Active Threats:

Replay

- Masquerade-

- Modification of Mess. Contents

- Denial of Service

Posted Date: 7/23/2013 5:30:30 AM | Location : United States







Related Discussions:- Explain the diffrent types of security attacks, Assignment Help, Ask Question on Explain the diffrent types of security attacks, Get Answer, Expert's Help, Explain the diffrent types of security attacks Discussions

Write discussion on Explain the diffrent types of security attacks
Your posts are moderated
Related Questions
What is data encapsulation? Data encapsulation is the method of breaking down information into smaller manageable chunks before it is transferred across the network. It is also

Point out the major advantages of Ring Topology. The benefits of ring topologies are: a. They are very simple to troubleshoot because every device incorporates a repeater.

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

TCP/IP protocols are managed into five basic layers. Although some layers of the TCP/IP reference model related to layers of the ISO reference model, the ISO layers procedure does

What is difference between ARP and RARP? The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

Describe the term - Certification Authority The certification is most easily implemented with a custom solution combined with a server, called the Certification Authority (CA).

Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i

a)  A host is sending a HTTP request to a HTTP server. In the table below, propose a correct set of source and destination port numbers for segments sent from host to server and fr

Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I