answersLogoWhite

0

Information security has two positive ideals for this area: Integrity and Availability. For data these ideas relate to the right quality of data at the right time requested. An opposite of data Integrity is unwanted data alteration. An opposite of data availability is unwanted data destruction.

Unwanted data alteration damages the useful quality of the information. Unwanted data destruction prevents timely access to use of the information. The methods of achieving unwanted data modification or damage may vary.

Generally, basic software quality assurance can detect programming flaws that alter or destroy useful data. But, attacks on software by viruses or other programs can alter programs correct operation -- resulting in a kind of hijacked software processing that can alter and/or destroy data.

Various methods, agendas and motives exist for these kinds of attacks. SQL Client Brute force login attempts, SQL Injection/alteration and Buffer Overflow attacks can trick database software into giving up privileged access, account passwords or even directly re-write software running on a system. In most cases, the initial objective is to gain unauthorized access rights. Using new found unauthorized privilege, follow up avenues of attack can be extended in scope and, if undetected, continue over an extended time period.

The complexity of these attacks can blur the line between data and software. For software itself is a kind of specialized data that instructs a computer to perform actions. Maliciously crafted data may be mistaken as computer software and run by a computer. If so, authorized control over a computer will likely be lost; alteration or destruction of data can occur as either a deliberate or accidental side effect of an attack.

Motives for data alteration or destruction attacks vary considerably. At some level, mixes of intangible benefit or profit combine to motivate an attack. Motive combined with technical opportunity can be very effective. Motives of such people vary from sabotaging the opposition (a rival business competitor or political party in an election) to gaining confidential and classified information for blackmailing and extortion. Revenge motives by offended, departing or terminated employees should also be considered.

Databases often run with elevated system privileges, support remote access, contain valuable data, use tool accounts and are sometimes awkward to patch. This can make such software a preferential target.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

Can you explain how damage on the stack works in Magic: The Gathering"?

In Magic: The Gathering, damage on the stack refers to the ability to use certain cards or effects to deal damage before it is actually dealt. This can be used strategically to take out creatures or players before they have a chance to respond.


Does cannabis have bad side effects?

YES IT CAN KILL YOU!!!! OTHER EFFECTS ARE: INFERTILITY IN MENBRAIN DAMAGE,LUNG DAMAGE,NASAL DAMAGE,IT CAN GET YOU ARRESTEDAND A CRIMINAL RECORD


Can you explain the concept of 'MTG damage on the stack' and how it impacts gameplay in Magic: The Gathering"?

In Magic: The Gathering, 'damage on the stack' was a rule that allowed players to respond to damage being dealt before it actually took effect. This rule was removed in 2010, but its impact on gameplay was significant as it allowed for strategic plays and interactions with cards that triggered upon dealing damage.


What is harmful effects of damage of ozone layers?

There are harmful effects of damage of ozone layer are many. Some of them are skin cancer, eye cataract etc.


Can pearling body modification damage the inside of a woman?

Pearling body modification involves inserting small beads or objects under the skin, which can potentially lead to complications like infection, scarring, or tissue damage. If not done carefully and hygienically, there is a risk of damaging the tissues underneath the skin. It's important to consult with a professional body modification artist and prioritize proper aftercare to minimize the risk of complications.


What're the after effects for someone who overdosed sleeping pills?

Possible liver damage, kidney damage, possibly brain damage.


What are the negative effects of overexposure to radiation?

DNA Damage.


What causes greatest damage to an explosion?

blast effects


Will gran turismo 5 have damage?

Damage effects have been confirmed for Gran Turismo 5.


Explain how ozone relates to evolution?

The lack or damage to the ozone layer will have some effects on the surface populations of the earth and they will have to evolve or die out.


What good effects of certain changes in the environment are the beneficial to you?

hard to explain. heres an example. in the state of new yourk the whitetail deer is highly over-populated. hunter thin out their numbers which prevents property damage.


What is the Effects of deforestration in people?

floods......... ..........damage to life.... ..........damage to property/ crops destroyed..... no source of income have to drink muddy water intense load-shedding effects buissness