Prerequisite – System Security
Threat and attack are two important events from a security perspective. It is really important to understand the difference between both from the perspective of network security.
A Threat is a possible security violation that might exploit the vulnerability of a system or asset. The origin of threat may be accidental, environmental (natural disaster), human negligence or human failure. Difference types of security threats are interruption, interception, fabrication and modification.
Attack is an deliberate unauthorized action on a system or asset. Attack can be classified as active and passive attack. An attack will have a motive and will follow a method when opportunity arise.
The difference between threat and attack are:
|1||Can be intentional or unintentional||Is intentional|
|2||May or may not be malicious||Is malicious|
|3||Circumstance that has ability to cause damage||Objective is to cause damage|
|4||Information may or may not be altered or damaged||Chance for information alteration and damage is very high|
|5||Comparatively hard to detect||Comparatively easy to detect|
|6||Can be blocked by control of vulnerabilities||Cannot be blocked by just controlling the vulnerabilities|
|7||Can be initiated by system itself as well as outsider||Is always initiated by outsider (system or user)|
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Active Attack and Passive Attack
- Microsoft Threat modelling tool 2016 | Set 1
- Threat Modelling
- DFD Based Threat modelling | Set 1
- DFD Based Threat Modelling | Set 2
- Microsoft Threat modelling tool 2016 | Set 2
- Difference between DOS and DDOS attack
- XML External Entity (XXE) and Billion Laughs attack
- Denial of Service DDoS attack
- Birthday attack in Cryptography
- Sybil Attack
- Man In The Middle Attack | Avoid Falling Victim to MITM
- Selective forwarding Attack in wireless Sensor Network
- Wormhole Attack in Wireless Sensor Networks
- What is Zed Attack Proxy?
- Brute Force Attack
- What is a Dictionary Attack?
- Sinkhole Attack in Wireless Sensor Networks
- US Maritime Attack
- Zero-day Exploit (Cyber Security Attack)
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.
Improved By : pp_pankaj