SunflowerCISSP Community-crafted CISSP™ mastery
Implementation Attack -

Implementation Attack

Views: 0
Votes: 0 (Avg 0.0)
This type of attack exploits weaknesses in the implementation of a cryptography system. It focuses on exploiting the software code, not just errors and flaws but methodology employed to program the encryption system.
Average rating: 0.0 (0 reviews)
Sign in to manage your flashcard decks and leave a comment.

Discussion (0)

No comments yet. Be the first to share your experience with this term.