15. Vulnerabilities of Security Architecture

Systems have many access points which may leave it vulnerable such as:

  • Emanations
  • State attacks
  • Covert channels
  • Technology and process integration
  • Mainframes and thin client systems
  • Middleware
  • Embedded systems
  • Pervasive computing/mobile devices
  • Single Point of Failure (SOF)
  • Connectivity (Data, Network)
  • Availability
  • Client-based vulnerabilities

System emanations spew out electromagnetic frequencies and a person within range can intercept this communication keystrokes and even the image. With the right equipment an attacker can view your screen from 100 feet away!

Time-of-check/Time-of-use attacks take advantage of the dependency on the timing of events that take place in a multitasking operating system. A race condition can occur as well that can cause a system crash.

Covert Channels have two types:

1. Storage channels that communicate via a stored object

2. Timing channels that modify the timing of events relative to each other

Leave a comment

Design a site like this with WordPress.com
Get started