数据完整性攻击
我需要构建针对中央情报局模型的不同类型攻击的三个示例。 现在 C 和 AI 可以毫无问题地找到很多材料,但我一点运气都没有 寻找完整性攻击的例子。
我了解对完整性的攻击要么旨在使数据无法使用,要么导致数据错误。 使其无法使用可能可以通过捕获 IP 数据包并加扰来实现 他们的数据。这完全正确吗?
任何搜索此内容的提示也很有帮助,因为我不太确定这些术语 因为我的学习不是英语。我已经尝试了“数据完整性”的所有变体, “数据完整性攻击”等,但没有运气。
I need to construct three examples of different kinds of attacks against the CIA model.
Now C and A I had no problems finding lots material for, but I'm having no luck at all
finding exaples of Integrity attacks.
I understand that attacks on Integrity either aim to make data un-usable or wrong.
Making it unusable could propably be made with catching IP packets and scrambling
their data. Is this at all correct?
Any tips for searching for this is also helpful as I'm not quite sure of the terms
as my studies are not in english. I've tried all variations of "Data Integrity",
"Data Integrity Attack" etc., but no luck.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
虽然这种诚信很重要,但这并不是中央情报局所指的。
在这种情况下,诚信意味着“我发送的就是您收到的”。就数据传输而言,我发送给您的内容是否有效并不重要。
为了使某些东西具有完整性,您必须能够肯定地说它已经或没有被修改。
因此,要解决这个问题,您必须找到一种方法来修改传输中的数据/数据包(中间人?),以使收件人不知道。您能想出一种方法来做到这一点,或者至少您需要哪些信息/访问权限来为此设计一种技术?
While that kind of integrity is important, it's not what CIA is referring to.
Integrity in this case means "what I sent is what you received." Whether or not what I sent you was valid to begin with is not of concern in terms of the transmission of the data.
For something to have integrity you would have to be able to say with certainty that it has or has not been modified.
So to attack that, you would have to find a way to modify the data/packet in transit (man in the middle?) in such a manner that the recipient wouldn't know it. Can you think of a way to do this, or at least what information/access you would need to devise a technique for this?
正如您所说,对完整性的攻击将涉及使数据不正确,无论是巧妙的还是明显的。想象一下一个学生闯入学校的计算机来修改他们的成绩;这是对完整性的攻击,因为没有任何不应该泄露的信息被泄露,并且尽管受到攻击,计算机仍然可用。
Like you stated, an attack on integrity would involve making data incorrect, either subtly or obviously. Think about a student breaking into their school's computer to modify their grades; that is an attack on integrity, since no information is revealed that shouldn't be and the computer remains usable despite the attack.