Different Attack Methods for Information Security
A CISM aspirant should be aware of the following methods and techniques for information system attacks:
- Alteration attack: In this type of attack, an alteration or modification is done of data or code without authorization. Cryptographic code is used to prevent an alteration attack.
- Botnets: Botnets are compromised computers, also known as zombie computers. They are primarily used to run malicious software for distributed denial of service (DdoS) attacks, adware, or spam.
- Buffer overflow: A buffer overflow, also known as buffer overrun, is the most common software coding error that can be exploited by an attacker to gain unauthorized access to a system. A buffer overflow occurs when more data is fed in than the buffer can handle. Excess data overflows to adjacent storage.
Due to this, the attacker gets an opportunity to manipulate the coding errors for malicious actions.
A major cause of buffer overflow is...