PowerPoint 簡報
Security Attacks :Passive Attacks and Active Attacks
Security attacks
Passive attacks
Active attacks
Interception
(confidentiality)
Interruption
(availability)
Modification
(integrity)
Fabrication
(integrity)
release of
message contents
traffic analysis
source
destination
1. normal flow
source
destination
2. interruption
source
destination
3. interception
source
destination
4. modification
source
destination
5. fabrication
前一張投影片
下一張投影片
回到第一張投影片
檢視圖形版本