Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Product List
Cipher-Slide6

There are a number of threats to a security system. The threats are intended to break or bypass the security system and gain access to whatever is being protected. Some of the threats are: Code scanning: also called a brute force attack, code scanning is where an attacker tries every possible key to gain access to the system. Code grabbing: this is where an attacker records a legitimate transmission and replays that transmission to gain access. Copy-paste attack: an attacker records a transmission, replaces part of the transmission with their own data and sends the modified transmission to gain access. Encryption attack: if an attack can be successfully made upon the encryption algorithm, the system is vulnerable. Physical attack: if a portion of the system can be physically accessed or stolen, the system may be vulnerable. For example, if someone steals a car keyfob, it may be compromised by the threat’s physical access to the hardware no matter how secure the link is.

PTM Published on: 2011-12-06