Match term to threat: Term Matching # Threat Spoofing preventing a legitimate user from accessing a service Man-in-the-middle accessing message parts such as credit card info Confidentiality modifying the message content Denial of Service interception of messages and playing to back to the service Replay Attacks establishing complete access to messages Message Alteration exploiting trusted relationships Term Matching # Threat Spoofing preventing a legitimate user from accessing a service Man-in-the-middle accessing message parts such as credit card info Confidentiality modifying the message content Denial of Service interception of messages and playing to back to the service Replay Attacks establishing complete access to messages Message Alteration exploiting trusted relationships Solution Spoofing: establishing complete access to messages. Man-in-the-middle: accessing message parts such as credit card info. Confidentiality: exploiting trusted relationships. Denial of Service: preventing a legitimate user from accessing a service. Replay Attacks: interception of messages and playing to back to the service. Message Alteration: modifying the message content..