T.Trust.Impersonate.1
|
High
|
Likely
|
An entity impersonates a policy authority entity and is recognized by the AMI System security domain as a valid policy authority.
|
T.Trust.Impersonate.2
|
High
|
Likely
|
An entity impersonates the Key Management System and is recognized by the AMI System security domain as the Key Management System.
|
T.Trust.Impersonate.3
|
High
|
Likely
|
An entity impersonates a known AMI System and is recognized by the AMI System security domain as that AMI System.
|
T.Trust.Impersonate.4
|
High
|
Likely
|
An entity impersonates a known non-AMI System and is recognized by the AMI System security domain as that non-AMI System.
|
T.Trust.Impersonate.5
|
High
|
Likely
|
An entity impersonates the Download Source and is recognized by the AMI System security domain as the Download Source.
|
T.Trust.Impersonate.6
|
High
|
Likely
|
An entity impersonates a user and is recognized by the AMI System security domain as that user.
|
T.Trust.Impersonate.7
|
High
|
Likely
|
An entity impersonates an application, and that application is recognized by the AMI System security domain as a valid application.
|
T.Trust.Impersonate.8
|
Medium
|
Unlikely
|
An entity impersonates the network infrastructure in order to analyze or affect IP datagrams transmissions.
|
T.Trust.Info.1
|
High
|
Likely
|
An entity creates trusted information assets in an unauthorized manner.
|
T.Trust.Res.1
|
High
|
Likely
|
An entity creates trusted resource assets in an unauthorized manner.
|
T.Trust.Serv.1
|
High
|
Likely
|
An entity is able to impersonate trusted service assets in an unauthorized manner.
|
|