Page 658 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 658

attacks must be addressed in your security policy and in your security
               model. TOCTTOU attacks, race condition exploits, and

               communication disconnects are known as state attacks because they
               attack timing, data flow control, and transition between one system
               state to another.


               Technology and Process Integration

               It is important to evaluate and understand the vulnerabilities in

               system architectures, especially in regard to technology and process
               integration. As multiple technologies and complex processes are
               intertwined in the act of crafting new and unique business functions,
               new issues and security problems often surface. As systems are
               integrated, attention should be paid to potential single points of failure
               as well as to emergent weaknesses in service-oriented architecture
               (SOA). An SOA constructs new applications or functions out of

               existing but separate and distinct software services. The resulting
               application is often new; thus, its security issues are unknown,
               untested, and unprotected. All new deployments, especially new
               applications or functions, need to be thoroughly vetted before they are
               allowed to go live into a production network or the public internet.


               Electromagnetic Radiation


               Simply because of the kinds of electronic components from which
               they’re built, many computer hardware devices emit electromagnetic
               (EM) radiation during normal operation. The process of
               communicating with other machines or peripheral equipment creates

               emanations that can be intercepted. It’s even possible to re-create
               keyboard input or monitor output by intercepting and processing
               electromagnetic radiation from the keyboard and computer monitor.
               You can also detect and read network packets passively (that is,
               without actually tapping into the cable) as they pass along a network
               segment. These emanation leaks can cause serious security issues but
               are generally easy to address.


               The easiest way to eliminate electromagnetic radiation interception is
               to reduce emanation through cable shielding or conduit and block
               unauthorized personnel and devices from getting too close to
   653   654   655   656   657   658   659   660   661   662   663