Difference between revisions of "Attack"

From CIPedia
Jump to navigation Jump to search
(ITU-T)
(ITU-T)
Line 12: Line 12:
 
=== Other International Definitions ===
 
=== Other International Definitions ===
 
==== ITU-T ====
 
==== ITU-T ====
{{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure
+
{{definition|(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. <ref>ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed
telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}
 
By a ''direct attack'' on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. ''Indirect attacks'' are performed
 
 
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br />
 
when they bypass the mechanism, or when they make the system use the mechanism incorrectly.<br />
 +
{{definition|Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. <ref>Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}<br />
 +
{{definition|Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. <ref>Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}
 +
<br />
  
 
=== National Definitions ===
 
=== National Definitions ===

Revision as of 17:39, 14 June 2015


Definitions

European Definitions

Other International Definitions

ITU-T

(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]

By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed

when they bypass the mechanism, or when they make the system use the mechanism incorrectly.

Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. [2]


Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. [3]


National Definitions

Standard Definition

Discussion Topic

See also

Attack tree

Notes

  1. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  2. Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  3. Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.

References