Page 1041 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1041

steal user credentials. After attackers have stolen a user’s credentials,

               they can launch an online impersonation attack by logging in as the
               user and accessing the user’s resources. In other cases, an access
               control attack can bypass authentication mechanisms and just steal
               the data.

               This book covers multiple attacks, and the following sections cover
               some common attacks directly related to access control.


               Access Aggregation Attacks

               Access aggregation refers to collecting multiple pieces of nonsensitive
               information and combining (i.e., aggregating) them to learn sensitive

               information. In other words, a person or group may be able to collect
               multiple facts about a system and then use these facts to launch an
               attack.

               Reconnaissance attacks are access aggregation attacks that combine
               multiple tools to identify multiple elements of a system, such as
               Internet Protocol (IP) addresses, open ports, running services,
               operating systems, and more. Attackers also use aggregation attacks

               against databases. Chapter 20, “Software Development Security,”
               covers aggregation and inference attacks that indirectly allow
               unauthorized individuals access to data using aggregation and
               inference techniques.

               Combining defense-in-depth, need-to-know, and least privilege
               principles helps prevent access aggregation attacks.


               Password Attacks


               Passwords are the weakest form of authentication, and there are many
               password attacks available. If an attacker is successful in a password
               attack, the attacker can gain access to the account and access resources
               authorized to the account. If an attacker discovers a root or
               administrator password, the attacker can access any other account and
               its resources. If attackers discover passwords for privileged accounts
               in a high-security environment, the security of the environment can
               never be fully trusted again. The attacker could have created other

               accounts or backdoors to access the system. Instead of accepting the
   1036   1037   1038   1039   1040   1041   1042   1043   1044   1045   1046