A Security Framework

Spoofing

Tampering

  • Unauthorized modificaton made to data:
    • Either in transit or at rest

Repudiation

  • Actions are performed without sufficient logging making it impossible to prove or disprove user responsibility

Information Disclosure

  • Sensitive data is exposed to unauthorized parties, breaching confidentiality

Denial of Service

Elevation of Priviledge