Difference between revisions of "Attack"

From CIPedia
Jump to navigation Jump to search
(Created page with "<!--Insert here introductory text regarding the term.--> ==Definitions== <!-- This section presents all available definitions of the above term.--> === European Definitions...")
 
Line 11: Line 11:
  
 
=== Other International Definitions ===
 
=== Other International Definitions ===
 
+
==== ITU-T ====
 +
{{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure
 +
telecommunications, ITU-T, Geneva (2012).</ref>}}
 +
By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed
 +
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br />
  
 
=== National Definitions ===
 
=== National Definitions ===
Line 37: Line 41:
  
 
<!-- Add category, i.e. [[Category:Main]] -->
 
<!-- Add category, i.e. [[Category:Main]] -->
[[Category:Simulation]]
+
[[Category:Main]][[Category:Threat]][[Category:Risk]]
[[Category:DIESIS-Glossary]]
+
{{#set:defined by=ITU-T}}
{{#set:defined by=EU project}}
 

Revision as of 15:56, 14 June 2015


Definitions

European Definitions

Other International Definitions

ITU-T

(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]

By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed when they bypass the mechanism, or when they make the system use the mechanism incorrectly.

National Definitions

Standard Definition

Discussion Topic

See also

Attack tree

Notes

  1. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012).

References