Hello There, Guest! RegisterLogin with Facebook
Login with Facebook

>>> Anna University Sixth Semester Question Bank Collection (R2013) ECE,MECH,CSE,IT,EEE,CIVIL,EIE
>>> Anna University Study Materials for all Departments
>>> Anna University Question Papers : April May June 2015 Question Papers | Nov Dec 2014 and Jan 2015 Question Papers

Register or Login to Submit Study Materials , Shoutbox and also to access Many Features !!

Vidyarthiplus Shop :: Handwritten Premium Lecture Notes
Share your Study Materials with us
Share your Study Materials with us : Click Here

EC2035 Cryptography and Network Security - Lecture Notes for Unit 5 - Edition 2014

university:anna university
subject code:EC2035
subject:cryptography and network security
content:EC2035-cryptography and network security-lecture notes for unit 5-edition 2014


One of the publicized threats to security is the intruders generally referred to as hackers or crackers.

There are three classes of intruders 
• Significant issue for networked systems is hostile or unwanted access either via network or local. 
• Can identify classes of intruders 

Masquerader: - An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.

Misfeasor: - A legitimate user who accesses data, program, or resources for  which such access is not authorized, or who is authorized for  such access but misuse his or her privileges. 

Clandestine user: - An individual who seizes supervisory control of the system 
 and uses this control to evade auditing and access controls  or to suppress audit collection 

Intrusion Techniques 
• Aim to increase privileges on system 
• Basic attack methodology 
– Target acquisition and information gathering 
– Initial access 
– Privilege escalation 
– Covering tracks 
• Key goal often is to acquire passwords so then exercise access rights of owner 

Intrusion Detection 
• Inevitably will have security failures 
• So need also to detect intrusions so can 
– Block if detected quickly act as deterrent 
– Collect info to improve security 
• Assume intruder will behave differently to a legitimate user 
– But will have imperfect distinction between 

Attachment link:

.pdf   UNIT-5 peri.pdf (Size: 779.31 KB / Downloads: 781)

mohanavalli, proud to be a member of Vidyarthiplus.com (V+) - Online Students Community since Nov 2012.



Recommend on Google

Vidyarthiplus Whatsapp