Spoofing
- Attackers Phishing
Tampering
- Unauthorized modificaton made to data:
- Either in transit or at rest
Repudiation
- Actions are performed without sufficient logging making it impossible to prove or disprove user responsibility
Information Disclosure
- Sensitive data is exposed to unauthorized parties, breaching confidentiality