数据完整性攻击

发布于 2024-10-24 08:36:39 字数 247 浏览 2 评论 0原文

我需要构建针对中央情报局模型的不同类型攻击的三个示例。 现在 C 和 AI 可以毫无问题地找到很多材料,但我一点运气都没有 寻找完整性攻击的例子。

我了解对完整性的攻击要么旨在使数据无法使用,要么导致数据错误。 使其无法使用可能可以通过捕获 IP 数据包并加扰来实现 他们的数据。这完全正确吗?

任何搜索此内容的提示也很有帮助,因为我不太确定这些术语 因为我的学习不是英语。我已经尝试了“数据完整性”的所有变体, “数据完整性攻击”等,但没有运气。

I need to construct three examples of different kinds of attacks against the CIA model.
Now C and A I had no problems finding lots material for, but I'm having no luck at all
finding exaples of Integrity attacks.

I understand that attacks on Integrity either aim to make data un-usable or wrong.
Making it unusable could propably be made with catching IP packets and scrambling
their data. Is this at all correct?

Any tips for searching for this is also helpful as I'm not quite sure of the terms
as my studies are not in english. I've tried all variations of "Data Integrity",
"Data Integrity Attack" etc., but no luck.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

美胚控场 2024-10-31 08:36:39

虽然这种诚信很重要,但这并不是中央情报局所指的。

在这种情况下,诚信意味着“我发送的就是您收到的”。就数据传输而言,我发送给您的内容是否有效并不重要。

为了使某些东西具有完整性,您必须能够肯定地说它已经或没有被修改。

因此,要解决这个问题,您必须找到一种方法来修改传输中的数据/数据包(中间人?),以使收件人不知道。您能想出一种方法来做到这一点,或者至少您需要哪些信息/访问权限来为此设计一种技术?

While that kind of integrity is important, it's not what CIA is referring to.

Integrity in this case means "what I sent is what you received." Whether or not what I sent you was valid to begin with is not of concern in terms of the transmission of the data.

For something to have integrity you would have to be able to say with certainty that it has or has not been modified.

So to attack that, you would have to find a way to modify the data/packet in transit (man in the middle?) in such a manner that the recipient wouldn't know it. Can you think of a way to do this, or at least what information/access you would need to devise a technique for this?

寻找一个思念的角度 2024-10-31 08:36:39

正如您所说,对完整性的攻击将涉及使数据不正确,无论是巧妙的还是明显的。想象一下一个学生闯入学校的计算机来修改他们的成绩;这是对完整性的攻击,因为没有任何不应该泄露的信息被泄露,并且尽管受到攻击,计算机仍然可用。

Like you stated, an attack on integrity would involve making data incorrect, either subtly or obviously. Think about a student breaking into their school's computer to modify their grades; that is an attack on integrity, since no information is revealed that shouldn't be and the computer remains usable despite the attack.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文