Sie sind auf Seite 1von 5

additional

reading
http://www.sans.org/rr/papers/6/132.pdf

RFC 2865
http://www.faqs.org/rfcs/rfc2865.html

RFC 2866
http://www.faqs.org/rfcs/rfc2866.html

RFC 1492
http://www.faqs.org/rfcs/rfc1492.html

Originally designed
http://www.faqs.org/rfcs/rfc1334.html

Buffer overflows
The buffer overflow problem is one of the oldest and most common problems in
software. It can result when a program fills up its buffer of memory with more
data than its buffer can hold.
When the program begins to write beyond the end of the buffer, the programs
execution path can be changed. This can lead to the insertion of malicious code
that can be used to destroy data or to gain administrative privileges on the
program or machine.

Covert channel
A covert channel is one that violates the organizations security policy through
an unintended communications path.
Covert channels have the potential for occurring when two or more subjects or
objects share a common resource.

Timing channel.
A timing channel utilizes the timing of occurrences of an activity to transfer
information in an unintended manner.

Storage channel
A storage channel utilizes changes in stored data to transfer information in an
unintended manner.

Data remanence
Data remanence occurs when some data, after the magnetic media is written over or
degaussed, still remains on the magnetic media.

Dumpster diving
This is when individuals access discarded trash to obtain user identifications,
passwords, and other data.

Eavesdropping
This is the use of software (sniffers) to monitor packets or wiretapping
telecommunication links to read transmitted data.

Emanations
Emanations are electronic signals that radiate from hardware devices Radio-frequency (RF) computer
devices are all susceptible to emanation interception. In the United States, TEMPEST /equipment is
designed to eliminate this problem.

Impersonation
Impersonation is masquerading as an authorized user to gain unauthorized access.

Masquerading/man-in-the-middle attacks
This involves someone who intercepts and manipulates packets being sent to a
networked computer. A masquerade takes place when one entity pretends to be a
different entity.

Object reuse
This refers to the possibility that sensitive data is available to a new subject.
It may occur when magnetic media or memory is reassigned to a new subject and the
media or memory still contains one or more objects that have not been purged
before the reassignment.

Replay
This is the passive capture of a packet and its subsequent retransmission to
produce an unauthorized effect.

Shoulder surfing

This is the process of direct visual observation of monitor displays to obtain


access to sensitive information.

Social engineering
This occurs when an unauthorized user tries to con authorized users into providing
the information needed to access systems

Spoofing
This is the act of masquerading as a different IP address. Packets can be
formatted with false (or fake) addresses to hide the originators true location.
It involves an intruder connected to the network and pretending to be a trusted
host.

Trapdoor
A trapdoor is an opening that system developers use to bypass the user
authentication process in software. It may be inadvertently left available after
software delivery.

Tunneling
This is a digital attack that attempts to get under a security system by accessing
low-level system functions.

RSBAC Adamantix Project


http://www.trusteddebian.org/

SE by NSA
http://www.nsa.gov/selinux/

LIDS
http://www.lids.org/

eTrust CA-ACF2
http://www3.ca.com/Solutions/Solution.asp?ID=271

SCOMP
http://www.hut.fi/~lhuovine/study/secbas98/skernel.html

Purple Penelope

http://www.hut.fi/~lhuovine/study/secbas98/skernel.html

Sans Reading Room


http://www.sans.org/rr/whitepapers/covert/

ucsb.edu
http://www.cs.ucsb.edu/~kemm/courses/cs177/Covert.pdf

Das könnte Ihnen auch gefallen