From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Implementation attacks

Implementation attacks

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

Implementation attacks

- [Instructor] Cryptographic systems may contain flaws based upon either their inherent design or the way that they were implemented in practice. These flaws may create vulnerabilities that allow an attacker to undermine the security of the system. Let's take a look at some of the implementation flaws that may disrupt the security of cryptographic systems. In fault injection attacks, the attacker attempts to compromise the integrity of a cryptographic device by causing some type of external fault. For example, they might use high-voltage electricity, high or low temperature, or other factors to cause a malfunction that undermines the security of the device. The fault condition may cause the system to fail to encrypt data properly, disclose unencrypted data, or experience other failures that jeopardize cryptographic security. Computer systems generate characteristic footprints of activity, such as changes in processor utilization,…

Contents