5.4 Exercises
-
Which type of data is attacked more frequently: persistent data, or data in transit?
-
An attack that involves disconnecting a server resource in some manner from a resource channel and replacing it with a different server resource is known as what kind of attack?
-
What type of subversive action must be completed before a trojan horse attack can be performed?
-
Explain what non-repudiation is.
-
What type of system deficiency does a buffer overflow attack exploit?
-
What type of organizational deficiency does a diversion rely on?
-
Varying CPU load to secretly signal internal sensitive information to an external listening process is an example of what kind of mechanism?
-
What type of system deficiency does a race condition exploit?
-
Inserting a rogue reference into a path variable exploits what kind of system weakness?
Answers and hints for these exercises can be found at http://www.assuredbydesign.com/haa/.