Difference between revisions of "Attack"
Jump to navigation
Jump to search
(Created page with "<!--Insert here introductory text regarding the term.--> ==Definitions== <!-- This section presents all available definitions of the above term.--> === European Definitions...") |
|||
Line 11: | Line 11: | ||
=== Other International Definitions === | === Other International Definitions === | ||
− | + | ==== ITU-T ==== | |
+ | {{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure | ||
+ | telecommunications, ITU-T, Geneva (2012).</ref>}} | ||
+ | By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed | ||
+ | when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br /> | ||
=== National Definitions === | === National Definitions === | ||
Line 37: | Line 41: | ||
<!-- Add category, i.e. [[Category:Main]] --> | <!-- Add category, i.e. [[Category:Main]] --> | ||
− | [[Category: | + | [[Category:Main]][[Category:Threat]][[Category:Risk]] |
− | [[Category: | + | {{#set:defined by=ITU-T}} |
− | {{#set:defined by= |
Revision as of 16:56, 14 June 2015
Contents
Definitions
European Definitions
Other International Definitions
ITU-T
(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]
By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.
National Definitions
Standard Definition
Discussion Topic
See also
Notes
- ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012).