Difference between revisions of "Attack"
From MgmtWiki
(Created page with "==Full Title or Meme== A program that attempts to exploit a Vulnerability ==References== Category: Glossary") |
(→Full Title or Meme) |
||
Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
A program that attempts to exploit a [[Vulnerability]] | A program that attempts to exploit a [[Vulnerability]] | ||
+ | |||
+ | ==Models== | ||
+ | Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system: | ||
+ | ● Online/offline guessing (repeatedly trying out the credentials or keys) | ||
+ | ● Credential duplication (copy of credentials and their keys) | ||
+ | ● Phishing (interception of credentials via fake websites/emails and social manipulation) | ||
+ | ● Eavesdropping | ||
+ | ● Replay attack (reuse of recorded messages) | ||
+ | ● Session hijacking | ||
+ | ● Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends | ||
+ | to be the respective counterpart) | ||
+ | ● Credential theft | ||
+ | ● Spoofing and masquerading | ||
==References== | ==References== | ||
[[Category: Glossary]] | [[Category: Glossary]] |
Revision as of 12:22, 19 January 2024
Full Title or Meme
A program that attempts to exploit a Vulnerability
Models
Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system: ● Online/offline guessing (repeatedly trying out the credentials or keys) ● Credential duplication (copy of credentials and their keys) ● Phishing (interception of credentials via fake websites/emails and social manipulation) ● Eavesdropping ● Replay attack (reuse of recorded messages) ● Session hijacking ● Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends to be the respective counterpart) ● Credential theft ● Spoofing and masquerading