Difference between revisions of "Attack"
Jump to navigation
Jump to search
(→ITU-T) |
(→ITU-T) |
||
Line 12: | Line 12: | ||
=== Other International Definitions === | === Other International Definitions === | ||
==== ITU-T ==== | ==== ITU-T ==== | ||
− | {{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure | + | {{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed |
− | telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}} | ||
− | By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed | ||
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br /> | when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br /> | ||
+ | {{definition|Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. <ref>Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}<br /> | ||
+ | {{definition|Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. <ref>Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}} | ||
+ | <br /> | ||
=== National Definitions === | === National Definitions === |
Revision as of 16:39, 14 June 2015
Contents
Definitions
European Definitions
Other International Definitions
ITU-T
(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]
By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.
Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. [2]
Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. [3]
National Definitions
Standard Definition
Discussion Topic
See also
Notes
- ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.
- ↑ Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.
- ↑ Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.