Skip to Content
Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
book

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

by Davi Ottenheimer, Matthew Wallace
May 2012
Intermediate to advanced
456 pages
12h 6m
English
Wiley
Content preview from Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Chapter 6

Finding Leaks and Obtaining a Side Channel

Lead me not into temptation; I can find the way myself.

—Rita Mae Brown

Have you ever heard a conversation through a wall? Did you wonder if the wall was too thin to shield your ears from noise, or did you blame yourself for having superior hearing?

Imagine that you have been asked to design a space to process materials that must be separate, such as in a winery or brewery. Various liquids will be situated in close proximity to each other yet will be isolated and protected. How will you determine the thickness needed for containment? Where will you find information on the risk of liquids to the container materials and methods of joining them?

Threat analysis can answer these questions. Corrosion is a symptom of containment failure. It presents many interesting examples of threat analysis. A collection of reliable data on corrosion, for example, predicts the appropriate thickness of materials used for containment and the effects of joining methods. The higher the chance of corrosion, to put it simply, the thicker a wall must be to prevent leaks and breaches.

Corrosion from an outside threat is not the only factor. A reaction between different metals (galvanic corrosion) can occur from the very materials used to build the wall. For example, welds may be more appropriate than rivets and bolts of different material.

One classic example of this kind of research on containment and corrosion comes from Sir Humphry Davy, who proposed ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Mike Harwood
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes

Publisher Resources

ISBN: 9781118239261Purchase book