From the course: Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 24,200 courses taught by industry experts.

Timing attacks

Timing attacks

- [Instructor] Our next attack type that we're going to look at is we're going to look at timing attacks. So anytime you talk about creating processes that happen out of order or happen in an order that isn't beneficial from the security standpoint, that's a timing based attack. So, you know, there used to be something that was popular back in the day. I've never done it, but I had a roommate actually that did this back in the days when people used to pay for things with checks, right? For those of you of a certain age, you remember writing checks, alright? So what my buddy would do is, you know, my buddy had a job, worked very hard. But by the end of the week the money was running low. And so she might want a pizza on Wednesday but didn't have any money in the bank account and was getting paid on Friday. So what she'd do is she'd order a pizza Wednesday night, pay for it with a check. By the time the check made its way to the bank, she'd already had her pizza and had already gotten…

Contents