Published by Patrick Mutisya · 14 days ago
Show understanding of the threats to computer and data security posed by networks and the Internet.
| Threat Category | Description | Typical Examples |
|---|---|---|
| Interception | Unauthorized access to data in transit. | Sniffing, packet capture, wiretapping |
| Interruption | Disruption of service or loss of data. | DDoS attacks, power failure, hardware failure |
| Modification | Unauthorised alteration of data. | Man‑in‑the‑middle, malware injection, SQL injection |
| Fabrication | Insertion of false data or commands. | Phishing, spoofed emails, forged certificates |
Attackers capture packets on a shared medium (e.g., Wi‑Fi) to read unencrypted data.
Attacker positions between two communicating parties, altering or relaying messages.
Flooding a target with traffic to exhaust resources, causing service unavailability.
Forging the source IP address to hide the attacker’s identity or to bypass access controls.
Manipulating the ARP cache to redirect traffic through the attacker’s machine.
Deceptive communications that trick users into revealing credentials or installing malware.
Viruses, worms, Trojans, ransomware delivered via web downloads, email attachments, or drive‑by attacks.
Injecting malicious SQL statements into web forms to manipulate databases.
Injecting client‑side scripts into webpages to steal cookies or perform actions on behalf of the user.
Automatic download of malicious code when a user visits a compromised website.
| Threat | Confidentiality | Integrity | Availability |
|---|---|---|---|
| Eavesdropping | Compromised | Unaffected | Unaffected |
| DoS/DDoS | Unaffected | Unaffected | Compromised |
| Malware (Ransomware) | Compromised | Compromised | Compromised |
| SQL Injection | Compromised | Compromised | Potentially affected |
Assume the probability of a single security control failing is \$p\$, and an attacker must bypass \$n\$ independent controls. The probability \$P_{success}\$ of a successful attack is:
\$\$
P_{success} = p^{\,n}
\$\$
If \$p = 0.1\$ and \$n = 3\$, then \$P_{success} = 0.1^3 = 0.001\$ (0.1%).
Networks and the Internet expose computers and data to a wide range of threats that can compromise confidentiality, integrity, and availability. Understanding the nature of these threats—whether they arise from passive eavesdropping, active manipulation, or service disruption—allows developers and administrators to implement layered security controls that reduce risk to an acceptable level.