Ami-sec risk Assessment & System Requirements


Social Engineering Threats



Yüklə 1,35 Mb.
səhifə17/30
tarix28.10.2017
ölçüsü1,35 Mb.
#17655
1   ...   13   14   15   16   17   18   19   20   ...   30

Social Engineering Threats


Social engineering threats are those threats that involve human-to-human breaches in security. Specific threats are listed below in Table 23.

Table 23. Social Engineering Threats






Threat Name

Severity

Likelihood

Description

T.Social_Eng.Access.1

High

Likely

An entity co-opts a AMI user to grant the entity system access.

T.Social_Eng.Access.2

High

Likely

An entity persuades a user of a non-AMI system with some level of access to AMI to divulge his AMI credentials.

T.Social_Eng.Access.3

High

Likely

An entity persuades a user of a different AMI system with some level of access to the AMI to divulge his AMI credentials.

T.Social_Eng.AdminLeak.1

High

Likely

An entity persuades an administrator of a non-AMI system to reveal information about system operational procedures, auditing or known flaws so as to enable the entity to access AMI.

T.Social_Eng.Authorize.1

Medium

Likely

An AMI entity co-opts a AMI user to grant the entity authorization to an asset.

T.Social_Eng.Info.1

Medium

Likely

An entity co-opts a AMI user to access information assets. The attacking entity may then access the information via the co-opted user (e.g., read over the shoulder of user, have user verbally tell content).

T.Social_Eng.Info.2

High

Likely

An entity co-opts a AMI user to exfiltrate information assets to a potential covert channel.

T.Social_Eng.Info.3

High

Likely

An entity co-opts a AMI user to modify information assets.

T.Social_Eng.Info.4

High

Likely

An entity attempts to guess a user passphrase based upon knowledge of the user.



      1. Trust Threats


Trust threats are those threats which involve either impersonation of a known entity or creation of trusted assets. Specific threats are listed below in Table 24.

Table 24. Trust Threats






Threat Name

Severity

Likelihood

Description

T.Trust.Impersonate.1

High

Likely

An entity impersonates a policy authority entity and is recognized by the AMI System security domain as a valid policy authority.

T.Trust.Impersonate.2

High

Likely

An entity impersonates the Key Management System and is recognized by the AMI System security domain as the Key Management System.

T.Trust.Impersonate.3

High

Likely

An entity impersonates a known AMI System and is recognized by the AMI System security domain as that AMI System.

T.Trust.Impersonate.4

High

Likely

An entity impersonates a known non-AMI System and is recognized by the AMI System security domain as that non-AMI System.

T.Trust.Impersonate.5

High

Likely

An entity impersonates the Download Source and is recognized by the AMI System security domain as the Download Source.

T.Trust.Impersonate.6

High

Likely

An entity impersonates a user and is recognized by the AMI System security domain as that user.

T.Trust.Impersonate.7

High

Likely

An entity impersonates an application, and that application is recognized by the AMI System security domain as a valid application.

T.Trust.Impersonate.8

Medium

Unlikely

An entity impersonates the network infrastructure in order to analyze or affect IP datagrams transmissions.

T.Trust.Info.1

High

Likely

An entity creates trusted information assets in an unauthorized manner.

T.Trust.Res.1

High

Likely

An entity creates trusted resource assets in an unauthorized manner.

T.Trust.Serv.1

High

Likely

An entity is able to impersonate trusted service assets in an unauthorized manner.







    1. Yüklə 1,35 Mb.

      Dostları ilə paylaş:
1   ...   13   14   15   16   17   18   19   20   ...   30




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin