Distributed attack
Distributed attack
A distributed attack requires that the adversary introduce code, such as a Trojan horse or back- door program, to a "trusted” component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.
No comments