European Proceedings Logo

Penetration Tools To Prevent Organizational Data Security Breaches

Table 5:

Interruption: The purpose of this attacks, interrupt the exchange of information between target systems. DoS, DDoS as an example of this attacks.
Intercept: It is listening between source and computers communication. Network sniffing is example of this attack.
Modification: The data sent to the target computer during the exchange of information captured by the attackers changed the destination is sent to the user. Safety integrity principle in this type of attack are being violated.
Fabrication: This attack has a new data generated by the attackers. Attack will occur with fake data sent to the target.
< Back to article