Thursday, July 18, 2019

Modification

Modification-



Modification attacks involve tampering with our asset. Such attacks might primarily be considered an integrity attack but could also represent an availability attack. If we access a file in an unauthorized manner and alter the data it contains, we have affected the integrity of the data contained in the file. However, if we consider  the  case where  the file in  question is a configuration file that manages  how a particular  service behaves,  perhaps  one  that  is acting as a Web server, we might  affect the  availability  of  that  service by changing the  contents of the file. If we continue with this concept and say the configuration we altered in the file for our Web server is one that alters how the server deals with encrypted connections, we could even make this a confidentiality attack

No comments:

Post a Comment