Attacks
Attacks
Attacks on integrity: Preventing the modification and preserving the consistency of information.
Unexpected input Some programs can be attacked by presenting Perform careful design review to ensure that all programs check for
them with malformed input of various types metacharacter, boundary conditions, and general integrity and
correct formatting of input data.
Allow only strong, trustworthy protocols through perimeter
security devices and extending access only to a limited group of
authorized users.
Use an intrusion detection system
Promptly apply any security-related patches that vendors releases.
Maintain a clear audit trial
Not all users can be trusted. 80% of attacks come Give users only those privileges necessary to perform their job
Abuse of privileges from inside the organization duties
Distribute high value responsibilities among several employees
Ensure the weakest link in your trust relationship design is
Computers often trust each other in implicit and
Trust relationship strong enough
explicit ways. Attackers exploit trust relationships to
exploitation Careful design of trust relationship to eliminate unnecessary
"leapfrog" from system to another.
dependencies
Regular review of system integrity
Backdoors are designed to give access to program Code review
Exploitation of backdoors and data by a higher authorized entity. Restriction of unnecessary protocols through perimeter
security.
Attacks on Confidentiality: Preventing the unauthorised disclosure of sensitive information.
Sometimes users can be tricked into disclosing Develop confidentiality policies and educate users about those
Social engineering information to an unauthorized party policies.
Are present on any system that shares resources
among multiple users according to a non-
Protocol review detection of attempts to cause leakage of
deterministic method. Convert channels allow user to
Convert channels deduce the types of tasks other users are performing
information
Network segmentations
or the contents of data sets, based on how a system
changes behavior.
Allow attacker to deduce classified
Data aggregation information from unclassified information
Careful review of information made public
Attacks on Availability: Authorised users should have timely and uninterrupted access to information or network.