1General Concepts in Security

1.1. Introduction

The recent massive evolutions in computing and communication technology have produced certain side effects, namely security problems.

Indeed, the use of networks facilitates communication and likewise, the spread of tools for attack and coordination among hackers. This is exactly the case in the development of road networks and modes of transportation that cause problems related to accidents and require investment in highway safety. Moreover, accumulated expertise from the development of software has been exploited for the development of malware.

Security attacks can be classified in two ways. The first classification is subdivided by the effect of the attack: either passive attacks, also called reconnaissance attacks, which consist of observing and divulging information via a third party, or active attacks, also known as access attacks, which are characterized by malicious acts that create doubt over information, users and communication channels. The second classification is subdivided by the means of attack: a direct attack using one’s own resources and identity or an indirect attack that passes through other intermediary computers.

Numerous variations of attacks continue to appear periodically. In fact, statistics have shown the volume of danger that threatens computer systems and the resulting material waste. Both of these aspects, without a doubt, make security a question of capital importance and an indispensable necessity. ...

Get Computer Science Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.