2019-05-23-CSIAC-Data-Manipulation

免费文档

VIP文档

ID:28078

大小:0.65 MB

页数:6页

时间:2023-01-01

金币:0

上传者:战必胜
Data Manipulation - CSIAC REPORT
23 May 2019
Data Manipulation
Keywords:
Data Security, Manipulation, Alteration, CIA, Data Manipulation Attacks
Confidentiality, Integrity and Availability
In terms of cybersecurity, the Confidentiality, Integrity and Availability, also known as the CIA
Triad, is a benchmark model for the development of security policies used to govern and
evaluate how an organization handles data when it is stored, transmitted or processed. All risks,
threats, and vulnerabilities are measured for their potential capability to compromise one or all of
the CIA triad principles. Let's look at the definitions of CIA: Confidentialityprotecting the
information from disclosure to unauthorized parties; Integrityprotecting information from
being modified by unauthorized parties; Availabilityensuring that authorized parties are able
to access the information when needed.
Data Manipulation
What is data manipulation? A misconception is that hackers always steal data, but this
assumption is incorrect. Data manipulation attacks occur when an adversary does not take data,
but instead makes subtle, stealthy tweaks to data for some type of gain or effect. These subtle
modifications of data could be as crippling to organizations as data breaches. Data manipulation
may result in distorted perception by shifting data around, which could lead to billions of dollars
in financial loss or even potential loss of life, depending on the system in question, and the type
of data being altered. In some scenarios however, what the attacker does not do may have a
more devastating outcome within the data space entity framework. The goal may be to
manipulate data to intentionally trigger external events that can be capitalized. The higher the
value of the fraud, the greater the chances are that the fraud has compromised data integrity. If
the data manipulation does not occur on a specific date but is conducted over several weeks or
months, it may be virtually impossible to correct this problem through a single system restore.
Hypothetical Data Manipulation Attack Examples
Let's examine several hypothetical data manipulation examples. Can you imagine what would
occur if a stock ticker symbol was manipulated to show a billion-dollar tech giant like Apple,
Microsoft, Google, or Amazon having extreme financial gains or losses? It could cause
immediate chaos and/or panic and could be used to target a competitor.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭