Difference between revisions of "Attack"
Jump to navigation
Jump to search
(→ITU-T) |
|||
Line 13: | Line 13: | ||
==== ITU-T ==== | ==== ITU-T ==== | ||
{{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure | {{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure | ||
− | telecommunications, ITU-T, Geneva (2012).</ref>}} | + | telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}} |
By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed | By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed | ||
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br /> | when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br /> |
Revision as of 15:59, 14 June 2015
Contents
Definitions
European Definitions
Other International Definitions
ITU-T
(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]
By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.
National Definitions
Standard Definition
Discussion Topic
See also
Notes
- ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.