<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
   <TITLE>What Can Be Prevented?</TITLE>
   <META NAME="Author" CONTENT="Mark S. Miller">
   <META NAME="GENERATOR" CONTENT="Mozilla/3.0Gold (Win95; I) [Netscape]">
</HEAD>
<BODY BACKGROUND="wood.gif">

<H1 ALIGN=CENTER>Prevention</H1>

<P>&lt;&lt;<A HREF="index.html">Taxonomy</A>&lt;&lt; Up to <A HREF="index.html">Taxonomy</A>&gt;&gt;<A HREF="leakage.html">Leakage</A>&gt;&gt;</P>

<TABLE ALIGN=RIGHT BORDER=4 CELLPADDING=4 >
<TR>
<TD>
<CENTER><P><A HREF="leakage.html">Improper Leakage of Authority or Info</A>
</P></CENTER>

<CENTER><TABLE BORDER=4 CELLPADDING=4 >
<TR>
<TD ALIGN=CENTER><A HREF="perimeter.html">Perimeter Security</A> </TD>

<TD ALIGN=CENTER><A HREF="confinement.html">Confinement</A> </TD>
</TR>

<TR>
<TD ALIGN=CENTER><A HREF="deputy.html">Confused Deputy</A></TD>

<TD ALIGN=CENTER><A HREF="conspirators.html">Communicating Conspirators</A></TD>
</TR>
</TABLE></CENTER>
</TD>
</TR>

<TR>
<TD>
<CENTER><P>Authenticity</P></CENTER>

<CENTER><TABLE BORDER=4 CELLPADDING=4 >
<TR>
<TD ALIGN=CENTER><A HREF="grant-match/grant-matcher.html">Object Identity</A></TD>
</TR>

<TR>
<TD ALIGN=CENTER>&quot;Principal&quot;</TD>
</TR>

<TR>
<TD ALIGN=CENTER>Pseudonymity</TD>
</TR>
</TABLE></CENTER>
</TD>
</TR>

<TR>
<TD>
<CENTER><P><A HREF="denial.html">Denial of Service</A></P></CENTER>

<CENTER><TABLE BORDER=4 CELLPADDING=4 >
<TR ALIGN=CENTER VALIGN=CENTER>
<TD>Concurrency</TD>

<TD>Networks</TD>

<TD>Hardware</TD>

<TD>Resources</TD>
</TR>
</TABLE></CENTER>
</TD>
</TR>
</TABLE>

<UL>
<LI><I>Improper leakage of information</I> occurs when someone/something
is able to obtain information they should have been prevented from having,
for example, by reading a file they were not supposed to be able to read.
Authority is the ability to perform certain actions, such as writing a
file. </LI>

<LI><I>Improper leakage of authority</I> occurs when when someone/something
comes to be able to take certain actions it should not have been authorized
to take.</LI>

<LI><I>Denial of service</I> occurs when an attacker can prevent a victim
from making forward progress of some sort, such as by preventing packets
from reaching a file server.</LI>
</UL>

<P><BR CLEAR=BOTH>
Each of these are or are not possible or practical depending on the particulars,
especially the cooperative patterns the participants are engaged in. The
child pages liked to by the table break this into separate cases.</P>

</BODY>
</HTML>
