请输入您要查询的百科知识:

 

词条 Attack surface
释义

  1. Examples of attack vectors

  2. Understanding an attack surface

  3. Surface reduction

  4. See also

  5. References

The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment.[1][2] Keeping the attack surface as small as possible is a basic security measure.[3]

Examples of attack vectors

{{main|Vector (malware)}}

Examples of attack vectors include user input fields, protocols, interfaces, and services.

Understanding an attack surface

Due to the increase in the countless potential vulnerable points each enterprise has, there has been increasing advantage for hackers and attackers as they only need to find one vulnerable point to succeed in their attack.[4]

There are three steps towards understanding and visualizing an attack surface:

Step 1: Visualize. Visualize the system of an enterprise is the first step, by mapping out all the devices, paths and networks.[4]Step 2: Find indicators of exposures. The second step is to correspond each indicator of a vulnerability being potentially exposed to the visualized map in the last step. One IOE can be "missing security controls in systems and software".[4]Step 3: Find indicators of compromise. This is an indicator that an attack has already succeeded.[4]

Surface reduction

One approach to improving information security is to reduce the attack surface of a system or software. The basic strategies of attack surface reduction include the following: reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. By having less code available to unauthorized actors, there will tend to be fewer failures. By turning off unnecessary functionality, there are fewer security risks. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[5]

See also

  • Vulnerability (computing)
  • Computer security
  • Attack Surface Analyzer
  • Vector (malware)
  • Vulnerability Management
  • Vulnerability Scanner

References

1. ^{{cite web|title=Attack Surface Analysis Cheat Sheet|url=https://www.owasp.org/index.php?title=Attack_Surface_Analysis_Cheat_Sheet&oldid=156006|publisher=Open Web Application Security Project|accessdate=30 October 2013}}
2. ^{{cite book|last=Manadhata|first=Pratyusa|title=An Attack Surface Metric|year=2008|url=http://reports-archive.adm.cs.cmu.edu/anon/2008/CMU-CS-08-152.pdf}}
3. ^{{Cite journal|last=Manadhata|first=Pratyusa|last2=Wing|first2=Jeannette M.|year=|title=Measuring a System’s Attack Surface|url=http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/ManadhataWing04.pdf|journal=|volume=|pages=|via=}}
4. ^{{Cite web|url=https://www.skyboxsecurity.com/sites/default/files/Attack%20Surface%20Visualization.pdf|title=Attack your Attack Surface|last=Friedman|first=Jon|date=March 2016|website=skyboxsecurity.com |archive-url=|archive-date=|dead-url=|access-date=March 6, 2017}}
5. ^{{cite web|last=Michael|first=Howard|title=Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users|url=http://msdn.microsoft.com/en-us/magazine/cc163882.aspx|publisher=Microsoft|accessdate=30 October 2013}}
{{software-eng-stub}}{{security-software-stub}}

1 : Computer security software

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/12 8:13:02