**3.1 Attacks types**

*Service Robotics*

• Conclusion.

• Future works.

**2. Security concept**

and telecommunications [1].

tion or sabotage.

**3. Security attacks**

receiving the message.

for authenticated entities.

hardware and software security of any system.

• References.

• Explain how performance metrics of a system can be evaluated.

Security aims for achieving the protection of system information in order to preserve the data from manipulation and theft and to attain the availability, confidentiality, and integrity. It includes protection of hardware, software, information,

Security is a term used to describe different states, such as lack of risks and threats situation, prevention of risks, or achieve confidence. Achieving security is required in many areas at the level of individuals and organisations. Ensuring security requires individuals with competence and experience, so the level of security varies from one organisation to another. To ensure better security for organisations and individuals, it is important for network users to use the systematic approach, which involves analysing, designing, implementing, and maintaining a required network security system [2].

There are many goals of security as illustrated below:

• *Authentication*: means verifying the identity of a device or person.

• *Confidentiality*: means preserving the information confidential to prevent unauthorised access to the information. Confidentiality loss of information

• *Availability*: means the data is available when needed. Failure to access infor-

• *Integrity*: means ensuring that the information is sound from manipulation and destruction. Lack of integration means that information is subject to modifica-

• *Non-repudiation*: Ensures that information can never deny ever sending or

• *Access control*: block illegitimate or unwanted access by restricting access only

In order to gain illegitimate access, adversaries are capable of exploiting system weaknesses. As systems move out from homes and offices security to more settings in every place, security importance cannot be denied. It is essential to guarantee the

In order to protect systems from attacks, security experts must assess and identify the risks and vulnerabilities of the system and define how to use mechanisms

means disclosure of information which leads to loss of information.

mation in a timely manner causes a system malfunction.

**94**

Many types of attacks are described below with some detail:

