answersLogoWhite

0


Best Answer

Information security has two positive ideals for this area: Integrity and Availability. For data these ideas relate to the right quality of data at the right time requested. An opposite of data Integrity is unwanted data alteration. An opposite of data availability is unwanted data destruction.

Unwanted data alteration damages the useful quality of the information. Unwanted data destruction prevents timely access to use of the information. The methods of achieving unwanted data modification or damage may vary.

Generally, basic software quality assurance can detect programming flaws that alter or destroy useful data. But, attacks on software by viruses or other programs can alter programs correct operation -- resulting in a kind of hijacked software processing that can alter and/or destroy data.

Various methods, agendas and motives exist for these kinds of attacks. SQL Client Brute force login attempts, SQL Injection/alteration and Buffer Overflow attacks can trick database software into giving up privileged access, account passwords or even directly re-write software running on a system. In most cases, the initial objective is to gain unauthorized access rights. Using new found unauthorized privilege, follow up avenues of attack can be extended in scope and, if undetected, continue over an extended time period.

The complexity of these attacks can blur the line between data and software. For software itself is a kind of specialized data that instructs a computer to perform actions. Maliciously crafted data may be mistaken as computer software and run by a computer. If so, authorized control over a computer will likely be lost; alteration or destruction of data can occur as either a deliberate or accidental side effect of an attack.

Motives for data alteration or destruction attacks vary considerably. At some level, mixes of intangible benefit or profit combine to motivate an attack. Motive combined with technical opportunity can be very effective. Motives of such people vary from sabotaging the opposition (a rival business competitor or political party in an election) to gaining confidential and classified information for blackmailing and extortion. Revenge motives by offended, departing or terminated employees should also be considered.

Databases often run with elevated system privileges, support remote access, contain valuable data, use tool accounts and are sometimes awkward to patch. This can make such software a preferential target.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Explain the concept and effects of data modification or data damage?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Can pearling body modification damage the inside of a woman?

yes


Does cannabis have bad side effects?

YES IT CAN KILL YOU!!!! OTHER EFFECTS ARE: INFERTILITY IN MENBRAIN DAMAGE,LUNG DAMAGE,NASAL DAMAGE,IT CAN GET YOU ARRESTEDAND A CRIMINAL RECORD


What physical damage and environmental effects resulted in hurricane Katrina?

what physical damage and environmental effects resulted in hurrican katrina


What is harmful effects of damage of ozone layers?

There are harmful effects of damage of ozone layer are many. Some of them are skin cancer, eye cataract etc.


What're the after effects for someone who overdosed sleeping pills?

Possible liver damage, kidney damage, possibly brain damage.


Will gran turismo 5 have damage?

Damage effects have been confirmed for Gran Turismo 5.


Greatest damage in an explosion?

In any explosion (conventional or nuclear) most of the damage is from blast effects.


What causes greatest damage to an explosion?

blast effects


What are the negative effects of overexposure to radiation?

DNA Damage.


What causes the greatest damage in explosions?

blast effects


What cuases the greatest damage in an explosion?

Blast effects.


What are the after effects of the tsunami in Japan?

a lot of damage and floods