SlideShare a Scribd company logo
Match term to threat:
Term
Matching #
Threat
Spoofing
preventing a legitimate user from accessing a service
Man-in-the-middle
accessing message parts such as credit card info
Confidentiality
modifying the message content
Denial of Service
interception of messages and playing to back to the service
Replay Attacks
establishing complete access to messages
Message Alteration
exploiting trusted relationships
Term
Matching #
Threat
Spoofing
preventing a legitimate user from accessing a service
Man-in-the-middle
accessing message parts such as credit card info
Confidentiality
modifying the message content
Denial of Service
interception of messages and playing to back to the service
Replay Attacks
establishing complete access to messages
Message Alteration
exploiting trusted relationships
Solution
Spoofing: establishing complete access to messages.
Man-in-the-middle: accessing message parts such as credit card info.
Confidentiality: exploiting trusted relationships.
Denial of Service: preventing a legitimate user from accessing a service.
Replay Attacks: interception of messages and playing to back to the service.
Message Alteration: modifying the message content.

More Related Content

More from info324235

About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
info324235
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
info324235
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
info324235
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
info324235
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
info324235
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
info324235
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
info324235
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
info324235
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
info324235
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
info324235
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
info324235
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
info324235
 
What two vitamins function as hormones a. vitamins D and E b. vitam.pdf
What two vitamins function as hormones a. vitamins D and E b. vitam.pdfWhat two vitamins function as hormones a. vitamins D and E b. vitam.pdf
What two vitamins function as hormones a. vitamins D and E b. vitam.pdf
info324235
 
What is the function of a gene List the four forces of evolutio.pdf
What is the function of a gene  List the four forces of evolutio.pdfWhat is the function of a gene  List the four forces of evolutio.pdf
What is the function of a gene List the four forces of evolutio.pdf
info324235
 
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdfWhat is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
info324235
 
Using your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdfUsing your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdf
info324235
 
3. If O2 is found in high concentration on the outside of a cella.pdf
3. If O2 is found in high concentration on the outside of a cella.pdf3. If O2 is found in high concentration on the outside of a cella.pdf
3. If O2 is found in high concentration on the outside of a cella.pdf
info324235
 
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
info324235
 
Use the substitution method to prove the running time of the followi.pdf
Use the substitution method to prove the running time of the followi.pdfUse the substitution method to prove the running time of the followi.pdf
Use the substitution method to prove the running time of the followi.pdf
info324235
 
True or False If a function f is continous but not differentiable a.pdf
True or False If a function f is continous but not differentiable a.pdfTrue or False If a function f is continous but not differentiable a.pdf
True or False If a function f is continous but not differentiable a.pdf
info324235
 

More from info324235 (20)

About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdfAbout 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
About 71 of young adult Internet users ( ages 18 to 29) use social-.pdf
 
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdfA certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
A certain ROM has 32 words x 16 bit structure. The input lines to th.pdf
 
________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf________________stakeholders are the ones who most directly interact.pdf
________________stakeholders are the ones who most directly interact.pdf
 
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
4) Devin invests $27,000 in a savings account that earns 2.15 compou.pdf
 
Write out a checklist for construction of a good graphic. For Ja.pdf
Write out a checklist for construction of a good graphic.  For Ja.pdfWrite out a checklist for construction of a good graphic.  For Ja.pdf
Write out a checklist for construction of a good graphic. For Ja.pdf
 
Which TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdfWhich TCPIP Application layer protocol provides IP address resoluti.pdf
Which TCPIP Application layer protocol provides IP address resoluti.pdf
 
why do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdfwhy do so many genes (20-30 of all genes) encode transport prot.pdf
why do so many genes (20-30 of all genes) encode transport prot.pdf
 
Why is the NFP at the venous end a negative number filtration occur.pdf
Why is the NFP at the venous end a negative number  filtration occur.pdfWhy is the NFP at the venous end a negative number  filtration occur.pdf
Why is the NFP at the venous end a negative number filtration occur.pdf
 
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdfWhat are 3 changes that occur in dendritic cells once they become ‘a.pdf
What are 3 changes that occur in dendritic cells once they become ‘a.pdf
 
Which of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdfWhich of the following traits is considered MendelianSelect one.pdf
Which of the following traits is considered MendelianSelect one.pdf
 
What are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdfWhat are three risks of not including best HR practices into the man.pdf
What are three risks of not including best HR practices into the man.pdf
 
When a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdfWhen a persons score on one variable is used to make predictions abo.pdf
When a persons score on one variable is used to make predictions abo.pdf
 
What two vitamins function as hormones a. vitamins D and E b. vitam.pdf
What two vitamins function as hormones a. vitamins D and E b. vitam.pdfWhat two vitamins function as hormones a. vitamins D and E b. vitam.pdf
What two vitamins function as hormones a. vitamins D and E b. vitam.pdf
 
What is the function of a gene List the four forces of evolutio.pdf
What is the function of a gene  List the four forces of evolutio.pdfWhat is the function of a gene  List the four forces of evolutio.pdf
What is the function of a gene List the four forces of evolutio.pdf
 
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdfWhat is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
What is the frequency of unilateral and bilateral retinoblastoma Ho.pdf
 
Using your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdfUsing your own personal experiences and knowledge please discuss the.pdf
Using your own personal experiences and knowledge please discuss the.pdf
 
3. If O2 is found in high concentration on the outside of a cella.pdf
3. If O2 is found in high concentration on the outside of a cella.pdf3. If O2 is found in high concentration on the outside of a cella.pdf
3. If O2 is found in high concentration on the outside of a cella.pdf
 
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
2. A certain drug causes kidney damage in 4 of patients. If 500 pati.pdf
 
Use the substitution method to prove the running time of the followi.pdf
Use the substitution method to prove the running time of the followi.pdfUse the substitution method to prove the running time of the followi.pdf
Use the substitution method to prove the running time of the followi.pdf
 
True or False If a function f is continous but not differentiable a.pdf
True or False If a function f is continous but not differentiable a.pdfTrue or False If a function f is continous but not differentiable a.pdf
True or False If a function f is continous but not differentiable a.pdf
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Match term to threatTermMatching #ThreatSpoofingpreventin.pdf

  • 1. Match term to threat: Term Matching # Threat Spoofing preventing a legitimate user from accessing a service Man-in-the-middle accessing message parts such as credit card info Confidentiality modifying the message content Denial of Service interception of messages and playing to back to the service Replay Attacks establishing complete access to messages Message Alteration exploiting trusted relationships Term Matching # Threat Spoofing preventing a legitimate user from accessing a service Man-in-the-middle accessing message parts such as credit card info Confidentiality modifying the message content Denial of Service interception of messages and playing to back to the service Replay Attacks establishing complete access to messages Message Alteration exploiting trusted relationships Solution Spoofing: establishing complete access to messages.
  • 2. Man-in-the-middle: accessing message parts such as credit card info. Confidentiality: exploiting trusted relationships. Denial of Service: preventing a legitimate user from accessing a service. Replay Attacks: interception of messages and playing to back to the service. Message Alteration: modifying the message content.