Difference between revisions of "Attack"

From MgmtWiki
Jump to: navigation, search
(Full Title or Meme)
(Models)
Line 4: Line 4:
 
==Models==
 
==Models==
 
Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system:
 
Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system:
Online/offline guessing (repeatedly trying out the credentials or keys)
+
* Online/offline guessing (repeatedly trying out the credentials or keys)
Credential duplication (copy of credentials and their keys)
+
* Credential duplication (copy of credentials and their keys)
Phishing (interception of credentials via fake websites/emails and social manipulation)
+
* Phishing (interception of credentials via fake websites/emails and social manipulation)
Eavesdropping
+
* Eavesdropping
Replay attack (reuse of recorded messages)
+
* Replay attack (reuse of recorded messages)
Session hijacking
+
* Session hijacking
Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends
+
* Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends to be the respective counterparty)
to be the respective counterpart)
+
* Credential theft
Credential theft
+
* Spoofing and masquerading
Spoofing and masquerading
 
  
 
==References==
 
==References==
  
 
[[Category: Glossary]]
 
[[Category: Glossary]]

Revision as of 11:23, 19 January 2024

Full Title or Meme

A program that attempts to exploit a Vulnerability

Models

Threat models are assessed according models like the ISO 29115 standard (ISO/IEC JTC 1/SC 27 2013), which describes standardized attack vectors for an IT system:

  • Online/offline guessing (repeatedly trying out the credentials or keys)
  • Credential duplication (copy of credentials and their keys)
  • Phishing (interception of credentials via fake websites/emails and social manipulation)
  • Eavesdropping
  • Replay attack (reuse of recorded messages)
  • Session hijacking
  • Man-in-the-middle attack (MitM; active attacker positions himself between the communication partners and pretends to be the respective counterparty)
  • Credential theft
  • Spoofing and masquerading

References