Threat Identification can be highly effective if we follow the STRIDE mechanism :
- Spoofing - It is pretending to be something or someone you are not
- Tampering - It is modifying something you are not supposed to
- Repudiation - It means claiming you did not do something
- Information Disclosure - unauthorized disclosure of Information
- Denial of Service - attack designed to effect the availability of Information System
- Elevation of Privilege -when a program or user is technically able to do things they are not supposed to
Just one doubt Deepesh...
ReplyDeleteIt is Spoofing or Phishing?
I think when you try some social engineering techniques to gain some unauthorized access by masquerading to someone is called Phising which you want to convey as Spoofing.
And Spoofing is the creation of TCP/IP packets using somebody else's IP address which means it is related to networking stuffs.
Am I right?
Spoofing in terms of threat modeling is a very wide term.. Spoofing of the packets / spoofing of the network address is one of them..while others are spoofing a person (phishing),spoofing a file on disk,spoofing a program in memory etc.
Deleteso in terms of threat they do lie under spoofing. The catch is in the controls to mitigate them
Thank you so much Deepesh for to the point explanation. (y)
DeleteSpoofing in terms of threat modeling is a very wide term.. Spoofing of the packets / spoofing of the network address is one of them..while others are spoofing a person (phishing),spoofing a file on disk,spoofing a program in memory etc.
ReplyDeleteso in terms of threat they do lie under spoofing. The catch is in the controls to mitigate them