Difference between revisions of "Attack"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Title or Meme== A program that attempts to exploit a Vulnerability ==References== Category: Glossary")
 
(Full Title or Meme)
Line 1: Line 1:
 
==Full Title or Meme==
 
==Full Title or Meme==
 
A program that attempts to exploit a [[Vulnerability]]
 
A program that attempts to exploit a [[Vulnerability]]
 +
 +
==Models==
 +
Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system:
 +
● Online/offline guessing (repeatedly trying out the credentials or keys)
 +
● Credential duplication (copy of credentials and their keys)
 +
● Phishing (interception of credentials via fake websites/emails and social manipulation)
 +
● Eavesdropping
 +
● Replay attack (reuse of recorded messages)
 +
● Session hijacking
 +
● Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends
 +
to be the respective counterpart)
 +
● Credential theft
 +
● Spoofing and masquerading
  
 
==References==
 
==References==
  
 
[[Category: Glossary]]
 
[[Category: Glossary]]

Revision as of 12:22, 19 January 2024

Full Title or Meme

A program that attempts to exploit a Vulnerability

Models

Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system: ● Online/offline guessing (repeatedly trying out the credentials or keys) ● Credential duplication (copy of credentials and their keys) ● Phishing (interception of credentials via fake websites/emails and social manipulation) ● Eavesdropping ● Replay attack (reuse of recorded messages) ● Session hijacking ● Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends to be the respective counterpart) ● Credential theft ● Spoofing and masquerading

References