Integrity Flashcards
1
Q
What is Unauthorised Modification? How to avoid this?
A
- Data has been changed without permission by unauthorised users.
- Assigning permission to users can ensure that only certain users can access and make necessary modifications.
2
Q
What is Impersonation Attack? How to prevent this?
A
- Where the individual trying to access sensitive information or system is pretending to be an authorised user.
- Educating users and adhering to anti-social engineering practices.
3
Q
What is the MITM attack and Replay attacks? How can they be avoided?
A
- Man in the middle attack is when an hacker has interecpeted communication between two hosts, and alters communications send between users without them realising or passively listen.
- A replay attack involves capturing a valid response or data exchanged between two parties (such as a client and a server) and then maliciously reusing that same response or data later on to access a computer system or network.
- Using encryption such as Transport Layer Security protocols when communicating between hosts can prevent two attacks.