Recent changes
Track the most recent changes to the wiki on this page.
List of abbreviations:
- N
- This edit created a new page (also see list of new pages)
- m
- This is a minor edit
- b
- This edit was performed by a bot
- (±123)
- The page size changed by this number of bytes
24 September 2024
23 September 2024
N 15:56 | Glossary:Supply chain attack diffhist +556 Philip talk contribs (Created page with "Modern hardware and software is generally composed of many different (hardware and software) components, some of these themselves composed of multiple sub-components. Keeping track of the provenance and trustworthiness of all of these can be an extremely difficult problem. Any of them might be compromised in a "supply chain" attack to compromise the integrity of a finished product. A classic example was the introduction of explosives into pagers and walkie-talkies suppli...") |
15:41 | Move log Philip talk contribs moved page Watering hole attack to Glossary:Watering hole attack without leaving a redirect |
|
N 15:40 | Watering hole attack 2 changes history +353 [Philip (2×)] | |||
|
15:40 (cur | prev) +9 Philip talk contribs | ||||
N |
|
14:00 (cur | prev) +344 Philip talk contribs (Created page with "A watering hole attack is an attempt to compromise a target organisation or individual by first compromising a website or online resource that they are known or suspected to use (their "watering hole"). In this way, for example, the attacker may hope to gain access to a well defended defence contractor though one of its less secure suppliers.") |
|
N 15:38 | Glossary:Side channel attack 2 changes history +504 [Philip (2×)] | |||
|
15:38 (cur | prev) +147 Philip talk contribs | ||||
N |
|
08:44 (cur | prev) +357 Philip talk contribs (Created page with "A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data to draw inferences about the data itself. For example, unless carefully designed, observing how the power consumed by a processor while encrypting data can leak informaion, ultimately leading to discovery of the encryption key.") |