Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 
Node is saved as draft in My Content >> Draft
  • Networking Security

    • 0
    • 0
    • 0
    • 0
    • 0
    • 0
    • 0
    • 0
    • 20
    Comment on it

    During initial days of internet, its use was limited to military and universities for research and development purpose.

     

    Later when all the source is getting integrated then people start to transmit data from one location.

     

    All security threats are intentional i.e. they occur only if intentionally triggered. Security threats can be divided into the following categories:

    • Interruption

       

      Interruption is a threat where the resources are being attacked. For example, a user is unable to access its web-server or the web-server is hijacked.

     

    • Privacy-Breach

       

      In this threat, the privacy of user is destroyed. Someone, who is not an authenticated person will access the data of authorized user.

     

    • Integrity

       

      The attacker gets the original data and damage or change it and pass it to the receiver and the original information will be with the intruder not with the receiver.

     

    • Authenticity

       

      This threat occurs when someone try to be the person who he/she is not want to enter into the system by other or someone.

     

     

     

    Cryptography 

     

     

    Networking

 0 Comment(s)

Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: