Page 1033 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1033

Understanding Access Control Attacks


               As mentioned in Chapter 13, one of the goals of access control is to
               prevent unauthorized access to objects. This includes access into any
               information system, including networks, services, communications

               links, and computers, and unauthorized access to data. In addition to
               controlling access, IT security methods seek to prevent unauthorized
               disclosure and unauthorized alteration, and to provide consistent
               availability of resources. In other words, IT security methods attempt
               to prevent loss of confidentiality, loss of integrity, and loss of

               availability.
               Security professionals need to be aware of common attack methods so

               that they can take proactive steps to prevent them, recognize them
               when they occur, and respond appropriately. The following sections
               provide a quick review of risk elements and cover some common
               access control attacks.

               While this section focuses on access control attacks, it’s important to
               realize that there are many other types of attacks, which are covered in

               other chapters. For example, Chapter 6, “Cryptography and Symmetric
               Key Algorithms,” covers various cryptanalytic attacks.



                  Crackers, Hackers, and Attackers


                  Crackers are malicious individuals who are intent on waging an
                  attack against a person or system. They attempt to crack the
                  security of a system to exploit it, and they are typically motivated

                  by greed, power, or recognition. Their actions can result in loss of
                  property (such as data and intellectual property), disabled systems,
                  compromised security, negative public opinion, loss of market
                  share, reduced profitability, and lost productivity. In many
                  situations, crackers are simply criminals.

                  In the 1970s and 1980s, hackers were defined as technology
                  enthusiasts with no malicious intent. However, the media now uses

                  the term hacker in place of cracker. Its use is so widespread that
   1028   1029   1030   1031   1032   1033   1034   1035   1036   1037   1038