SlideShare a Scribd company logo
1 of 2
Download to read offline
Match term to threat:
Term
Matching #
Threat
Spoofing
preventing a legitimate user from accessing a service
Man-in-the-middle
accessing message parts such as credit card info
Confidentiality
modifying the message content
Denial of Service
interception of messages and playing to back to the service
Replay Attacks
establishing complete access to messages
Message Alteration
exploiting trusted relationships
Term
Matching #
Threat
Spoofing
preventing a legitimate user from accessing a service
Man-in-the-middle
accessing message parts such as credit card info
Confidentiality
modifying the message content
Denial of Service
interception of messages and playing to back to the service
Replay Attacks
establishing complete access to messages
Message Alteration
exploiting trusted relationships
Solution
Spoofing: establishing complete access to messages.
Man-in-the-middle: accessing message parts such as credit card info.
Confidentiality: exploiting trusted relationships.
Denial of Service: preventing a legitimate user from accessing a service.
Replay Attacks: interception of messages and playing to back to the service.
Message Alteration: modifying the message content.

More Related Content

More from info324235

What is the function of a gene List the four forces of evolutio.pdf
What is the function of a gene  List the four forces of evolutio.pdfWhat is the function of a gene  List the four forces of evolutio.pdf
What is the function of a gene List the four forces of evolutio.pdf
info324235
 
Using your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdfUsing your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdf
info324235
 

More from info324235 (20)

About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
 
What two vitamins function as hormones a. vitamins D and E b. vitam.pdf
What two vitamins function as hormones a. vitamins D and E b. vitam.pdfWhat two vitamins function as hormones a. vitamins D and E b. vitam.pdf
What two vitamins function as hormones a. vitamins D and E b. vitam.pdf
 
What is the function of a gene List the four forces of evolutio.pdf
What is the function of a gene  List the four forces of evolutio.pdfWhat is the function of a gene  List the four forces of evolutio.pdf
What is the function of a gene List the four forces of evolutio.pdf
 
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdfWhat is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
 
Using your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdfUsing your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdf
 
3. If O2 is found in high concentration on the outside of a cella.pdf
3. If O2 is found in high concentration on the outside of a cella.pdf3. If O2 is found in high concentration on the outside of a cella.pdf
3. If O2 is found in high concentration on the outside of a cella.pdf
 
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
 
Use the substitution method to prove the running time of the followi.pdf
Use the substitution method to prove the running time of the followi.pdfUse the substitution method to prove the running time of the followi.pdf
Use the substitution method to prove the running time of the followi.pdf
 
True or False If a function f is continous but not differentiable a.pdf
True or False If a function f is continous but not differentiable a.pdfTrue or False If a function f is continous but not differentiable a.pdf
True or False If a function f is continous but not differentiable a.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Match term to threatTermMatching #ThreatSpoofingpreventin.pdf

  • 1. Match term to threat: Term Matching # Threat Spoofing preventing a legitimate user from accessing a service Man-in-the-middle accessing message parts such as credit card info Confidentiality modifying the message content Denial of Service interception of messages and playing to back to the service Replay Attacks establishing complete access to messages Message Alteration exploiting trusted relationships Term Matching # Threat Spoofing preventing a legitimate user from accessing a service Man-in-the-middle accessing message parts such as credit card info Confidentiality modifying the message content Denial of Service interception of messages and playing to back to the service Replay Attacks establishing complete access to messages Message Alteration exploiting trusted relationships Solution Spoofing: establishing complete access to messages.
  • 2. Man-in-the-middle: accessing message parts such as credit card info. Confidentiality: exploiting trusted relationships. Denial of Service: preventing a legitimate user from accessing a service. Replay Attacks: interception of messages and playing to back to the service. Message Alteration: modifying the message content.