...性 信息篡改(modification - of info) -攻击完整性 消息伪造(fabrication - of info)- 攻击认证性(attacks authentication )2013年5月13日6时19分 计算机网络安全基础 1.2 威胁网络安全的因素三、类型非授权访问。
基于16个网页-相关网页
Users may select encryption without specifying authentication, but this action leaves the packets vulnerable to active attacks, which can lead to an outside entity breaking the encryption.
用户可以选择不用特定的认证进行加密,但是这样会让包容易受到攻击,导致让别人破坏加密。
A simple hash, as sometimes used in HTTP Basic authentication, is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password.
简单的哈希(例如有时在HTTP基本身份验证中使用的哈希)易受到回复攻击的威胁,因为攻击者可以很容易地探查到通信并能够在不知道密码的情况下回复哈希。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
应用推荐