Threat Modelling
Threat Modelling
The assumption for threat modelling is that the attacker will not
target a system that doesnt store some attractive resources.
Because of that, its worth it to reverse the natural order in
securing the system and start with presenting a classification of
the results of a successful intrusion rather than with a risk
assessment
Spoofing Identity
Tampering with Data
Repudiation, Deniability
Information Disclosure
Denial of Service
Elevation of Privilege
Spoofing certificate-based
authentication systems to get
elevated privilege access to
the system
Spoofing Identity
Spoofing Identity
To create an account, you only needed to provide your resident ID and first and last name or
your taxpayer ID or the place of birth or the birth name of your mother. Taxpayer IDs and
resident IDs of entrepreneurs were public information
They also can contain their addresses, years of birth and even
the birth names of their mothers. Once you provided this info, the application automatically
filled out the address field
were provided in the plaintext. To discover
them, you simply had to call a help line and submit the info you already knew (like the
taxpayer ID) to have a consultant give you the password
Its the number one target for attackers since day one
Repudiation, Deniability
Repudiation, Deniability
of an employment centre was arrested on
charges
of
illegally
obtaining
unemployment
benefits
by
creating
fictitious records. He created addresses
and IDs for fictitious persons, entered the
data into the centres computer network
and then received the benefits for nonexisting people, gaining about 40 thousand
dollars.
Information Disclosure
Information Disclosure
Denial of Service
Evelation of Privilege