Attacks Flashcards
Interception attacks
Allow unauthorized users to access your data, applications, or environments. If done right can be difficult to detect. (Confidentiality) (Data at rest or in motion)
Ex. Unauthorized file viewing, reading someone else’s email.
Interruption attacks
Make your assets unusable or unavailable to you on a temporary or permanent basis. (Availability / sometimes Integrity)
Ex. DoS on email server is availability. An attack on the processes on which a database runs to prevent the access of said data could be considered an integrity attack bc of the possible corruption of data.
Modification attacks
Involve tampering with an asset. (Integrity/ sometimes Availability)
Tampering of data = Integrity attack
If the file is a configuration file that acts as a web server = Availability attack
Fabrication attacks
Generating data, processes, communications, or other similar material with a system. (Integrity / sometimes availability)
Generating enough additional processes that consume resources you would be conducting an availability attack by rendering the service unavailable.