Escolar Documentos
Profissional Documentos
Cultura Documentos
On
INFORMATION SECURITY
PRESENTED BY
K.PRIYA, P.BHARATHI,
III/IV B.TECH, III/IV B.TECH,
.
1
Types of Attacks:
A second type of passive attack, traffic
analysis, Suppose that we had a way of
masking the contents of messages or other
information traffic so that opponents, even if
they captured the message, could not extract
the information from the message.
Active Attacks:
Passive Attacks:
2
The denial of service prevents or inhibits the
normal use or management of
communications facilities.
Security Services:
Replay involves the passive capture of a Confidentiality (privacy)
data unit and its subsequent retransmission
to produce an unauthorized effect. Authentication (who created or sent
the data)
3
loopholes, of which cryptography has
and is playing a major role.
“Cryptography” is evergreen and
developments in this area are a better
option.
REFERENCES:
William Stallings: Cryptography
and Network security: principles and
practice: 2nd edition.