Thursday, July 18, 2019

Fabrication

Fabrication-



Fabrication attacks involve generating data, processes, communications, or other similar activities with a system. Fabrication attacks primarily affect integrity but could be considered an availability attack as well. If we generate spurious information  in  a database,  this would  be considered  to be a fabrication  attack. We could also generate e-mail, which is commonly used as a method for propagating malware, such as we might find being used to spread a worm.  In the sense of an availability attack, if we generate enough  additional processes, network  traffic, e-mail, Web traffic, or nearly anything  else that consumes  resources, we can potentially render  the service that  handles  such traffic unavailable to legitimate users of the system

No comments:

Post a Comment