Integrity Flashcards

1
Q

What is Unauthorised Modification? How to avoid this?

A
  • Data has been changed without permission by unauthorised users.
  • Assigning permission to users can ensure that only certain users can access and make necessary modifications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Impersonation Attack? How to prevent this?

A
  • Where the individual trying to access sensitive information or system is pretending to be an authorised user.
  • Educating users and adhering to anti-social engineering practices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the MITM attack and Replay attacks? How can they be avoided?

A
  • Man in the middle attack is when an hacker has interecpeted communication between two hosts, and alters communications send between users without them realising or passively listen.
  • A replay attack involves capturing a valid response or data exchanged between two parties (such as a client and a server) and then maliciously reusing that same response or data later on to access a computer system or network.
  • Using encryption such as Transport Layer Security protocols when communicating between hosts can prevent two attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly