
Systems have many access points which may leave it vulnerable such as:
- Emanations
- State attacks
- Covert channels
- Technology and process integration
- Mainframes and thin client systems
- Middleware
- Embedded systems
- Pervasive computing/mobile devices
- Single Point of Failure (SOF)
- Connectivity (Data, Network)
- Availability
- Client-based vulnerabilities
System emanations spew out electromagnetic frequencies and a person within range can intercept this communication keystrokes and even the image. With the right equipment an attacker can view your screen from 100 feet away!
Time-of-check/Time-of-use attacks take advantage of the dependency on the timing of events that take place in a multitasking operating system. A race condition can occur as well that can cause a system crash.
Covert Channels have two types:
1. Storage channels that communicate via a stored object
2. Timing channels that modify the timing of events relative to each other