Information Security and Assurance -
C725 - final Study latest update
STRIDE threat model ✔✔Spoofing: An attack with the goal of gaining access to a target system
through the use of a falsified identity. Spoofing can
...
Information Security and Assurance -
C725 - final Study latest update
STRIDE threat model ✔✔Spoofing: An attack with the goal of gaining access to a target system
through the use of a falsified identity. Spoofing can be used against Internet Protocol (IP)
addresses, MAC addresses, usernames, system names, wireless network service set identifiers
(SSIDs), email addresses, and many other types of logical identification. When an attacker spoofs
their identity as a valid or authorized entity, they are often able to bypass filters and blockades
against unauthorized access. Once a spoofing attack has successfully granted an attacker access to
a target system, subsequent attacks of abuse, data theft, or privilege escalation can be initiated.
Tampering: Any action resulting in unauthorized changes or manipulation of data, whether in
transit or in storage. Tampering is used to falsify communications or alter static information. Such
attacks are a violation of integrity as well as availability.
Repudiation: The ability of a user or attacker to deny having performed an action or activity. Often
attackers engage in repudiation attacks in order to maintain plausible deniability so as not to be
held accountable for their actions. Repudiation attacks can also result in innocent third parties
being blamed for security violations.
Information disclosure: The revelation or distribution of private, confidential, or controlled
information to external or unauthorized entities. This could include customer identity information,
financial information, or proprietary business operation details. Information disclosure can take
advantage of system design and implementation mistakes, such as failing to remove debugging
code, leaving sample applications and accounts, not sanitizing programming notes from clientvisible content (such as comments in Hypertext Markup Language (HTML) documents), using
hidden form fields, or allowing overly detailed error messages to be shown to users.
Denial of service (DoS): An attack that attempts to prevent authorized use of a resource. This can
be done through flaw exploitation, connection overloading, or traffic flooding. A DoS attack does
not necessarily result in full interruption to a resource; it could instead reduce throughput or
introduce latency in order to hamper productive use of a resource. Although most DoS attacks are
temporary and last only as long as the attacker maintains the onslaught, there are some permanent
DoS attacks. A permanent DoS attack might involve the destruction of a dataset, the replacement
of software with malicious alternatives, or forcing a firmware flash operation that could be
interrupted or that installs faulty firmware. Any of these DoS attacks would render a permanently
damaged system that is not able to be restored to normal operation with a simple reboot or by
waiting out the attackers. A full system repair a
[Show More]