Está en la página 1de 38

INFORMATION SECURITY - (202016905A_1141)

Unit 2 - Task 3 - Modeling Threats - Evaluation rubric and activity submission

Descripción  Tampering: significa en idioma inglés,


de la manipulación, manoseo, intromisión. Los
amenaza ataques parameter tampering en
aplicaciones web consisten en la
modificación de los parámetros que se
envían al servidor web como puntos de
entrada de la aplicación, ya sea los que
viajan en los formularios o en la propia
URL.
 Spoofing: es suplantación de identidad o
spoofing en términos de seguridad de
redes, hace referencia al uso de técnicas
a través de las cuales un atacante,
generalmente con usos maliciosos o de
investigación, se hace pasar por una
entidad distinta a través de la falsificación
de los datos en una comunicación.
 Repudiation: En esta categoría, se trata
de establecer un nivel adecuado del
seguimiento de las acciones realizadas
por los usuarios de la aplicación; con el fin
de evitar que aparezcan situaciones no
deseadas se debe intentar garantizar él
no repudio de los usuarios.
 Information Disclosure: Exposición de
información privada a individuos que
normalmente no tendrían acceso a ella.
 Elevation of privilege: Proceso
mediante el cual un usuario engaña al
sistema para que le otorgue derechos no
autorizados, usualmente con el propósito
de comprometer o destruir el sistema.
Muchos ataque empiezan por la obtención
de privilegios limitados en un sistema,
pasando posteriormente a incrementar
estos privilegios para, en última instancia,
controlar el sistema.
 Mantener la Integridad, Disponibilidad,
Privacidad, Control y Autenticidad de la
información manejada por computadora.
Objetivo
 Los usuarios deben tener disponibles
todos los componentes del sistema
cuando así lo deseen

Técnicas de Utilizar mecanismo de autenticación estándar


ataque para identificar la entidad externa.

ID: 14

THREAT: SERVIDOR DE BD Process Memory Tampered

CATEGORY: Tampering

DESCRIPTION:

If SERVIDOR DE BD is given access to memory, such as shared memory or pointers, or is given the
ability to control what Servidor executes (for example, passing back a function pointer.), then
SERVIDOR DE BD can tamper with Servidor. Consider if the function could work with less access to
memory, such as passing data rather than pointers. Copy in data provided, and then validate it.

SHORT DESCRIPTION:Tampering is the act of altering the bits. Tampering with a process involves
changing bits in the running process. Similarly, Tampering with a data flow involves changing bits
on the wire or between two running processes.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 22

THREAT: Servidor Process Memory Tampered

CATEGORY: Tampering

DESCRIPTION:

If Servidor is given access to memory, such as shared memory or pointers, or is given the ability to
control what SERVIDOR DE BD executes (for example, passing back a function pointer.), then
Servidor can tamper with SERVIDOR DE BD. Consider if the function could work with less access to
memory, such as passing data rather than pointers. Copy in data provided, and then validate it.

SHORT DESCRIPTION:Tampering is the act of altering the bits. Tampering with a process involves
changing bits in the running process. Similarly, Tampering with a data flow involves changing bits
on the wire or between two running processes.

JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated
STATE: Not Started

PRIORITY: High

ID: 30

THREAT: Potential SQL Injection Vulnerability for A

CATEGORY: Tampering

DESCRIPTION:

SQL injection is an attack in which malicious code is inserted into strings that are later passed to an
instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements
should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically
valid queries that it receives. Even parameterized data can be manipulated by a skilled and
determined attacker.

SHORT DESCRIPTION:Tampering is the act of altering the bits. Tampering with a process involves
changing bits in the running process. Similarly, Tampering with a data flow involves changing bits
on the wire or between two running processes.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 29

THREAT: Spoofing of Destination Data Store A

CATEGORY: Spoofing

DESCRIPTION:

A may be spoofed by an attacker and this may lead to data being written to the attacker's target
instead of A. Consider using a standard authentication mechanism to identify the destination data
store.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 32

THREAT: Spoofing of Source Data Store A

CATEGORY: Spoofing
DESCRIPTION:

A may be spoofed by an attacker and this may lead to incorrect data delivered to SERVIDOR DE BD.
Consider using a standard authentication mechanism to identify the source data store.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 41

THREAT: Spoofing of the ADMINISTRADOR External Destination Entity

CATEGORY: Spoofing

DESCRIPTION:
ADMINISTRADOR may be spoofed by an attacker and this may lead to data being sent to the
attacker's target instead of ADMINISTRADOR. Consider using a standard authentication
mechanism to identify the external entity.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: Response

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 34

THREAT: Spoofing the ADMINISTRADOR External Entity

CATEGORY: Spoofing

DESCRIPTION:

ADMINISTRADOR may be spoofed by an attacker and this may lead to unauthorized access to
Servidor. Consider using a standard authentication mechanism to identify the external entity.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.
JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 11

THREAT: Spoofing of Source Data Store PAGINA WEB EN DISCO

CATEGORY: Spoofing

DESCRIPTION:

PAGINA WEB EN DISCO may be spoofed by an attacker and this may lead to incorrect data
delivered to Servidor. Consider using a standard authentication mechanism to identify the source
data store.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: PAGINAS
DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 13

THREAT: Spoofing the SERVIDOR DE BD Process

CATEGORY: Spoofing

DESCRIPTION:

SERVIDOR DE BD may be spoofed by an attacker and this may lead to unauthorized access to
Servidor. Consider using a standard authentication mechanism to identify the source process.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 21

THREAT: Spoofing the Servidor Process

CATEGORY: Spoofing

DESCRIPTION:

Servidor may be spoofed by an attacker and this may lead to unauthorized access to SERVIDOR DE
BD. Consider using a standard authentication mechanism to identify the source process.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 1

THREAT: Spoofing of the Usuario External Destination Entity

CATEGORY: Spoofing

DESCRIPTION:

Usuario may be spoofed by an attacker and this may lead to data being sent to the attacker's
target instead of Usuario. Consider using a standard authentication mechanism to identify the
external entity.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: Response

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 4

THREAT: Spoofing the Usuario External Entity

CATEGORY: Spoofing
DESCRIPTION:

Usuario may be spoofed by an attacker and this may lead to unauthorized access to Servidor.
Consider using a standard authentication mechanism to identify the external entity.

SHORT DESCRIPTION:Spoofing is when a process or entity is something other than its claimed
identity. Examples include substituting a process, a file, website or a network address.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 42

THREAT: External Entity ADMINISTRADOR Potentially Denies Receiving Data

CATEGORY: Repudiation

DESCRIPTION:

ADMINISTRADOR claims that it did not receive data from a process on the other side of the trust
boundary. Consider using logging or auditing to record the source, time, and summary of the
received data.
SHORT DESCRIPTION:Repudiation threats involve an adversary denying that something happened.

JUSTIFICATION:

<none provided>

INTERACTION: Response

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 5

THREAT: Potential Data Repudiation by Servidor

CATEGORY: Repudiation

DESCRIPTION:

Servidor claims that it did not receive data from a source outside the trust boundary. Consider
using logging or auditing to record the source, time, and summary of the received data.

SHORT DESCRIPTION:Repudiation threats involve an adversary denying that something happened.

JUSTIFICATION:

<none provided>
INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 15

THREAT: Potential Data Repudiation by Servidor

CATEGORY: Repudiation

DESCRIPTION:

Servidor claims that it did not receive data from a source outside the trust boundary. Consider
using logging or auditing to record the source, time, and summary of the received data.

SHORT DESCRIPTION:Repudiation threats involve an adversary denying that something happened.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 35

THREAT: Potential Data Repudiation by Servidor

CATEGORY: Repudiation

DESCRIPTION:

Servidor claims that it did not receive data from a source outside the trust boundary. Consider
using logging or auditing to record the source, time, and summary of the received data.

SHORT DESCRIPTION:Repudiation threats involve an adversary denying that something happened.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 23

THREAT: Potential Data Repudiation by SERVIDOR DE BD

CATEGORY: Repudiation

DESCRIPTION:

SERVIDOR DE BD claims that it did not receive data from a source outside the trust boundary.
Consider using logging or auditing to record the source, time, and summary of the received data.

SHORT DESCRIPTION:Repudiation threats involve an adversary denying that something happened.

JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 2

THREAT: External Entity Usuario Potentially Denies Receiving Data

CATEGORY: Repudiation
DESCRIPTION:

Usuario claims that it did not receive data from a process on the other side of the trust boundary.
Consider using logging or auditing to record the source, time, and summary of the received data.

SHORT DESCRIPTION:Repudiation threats involve an adversary denying that something happened.

JUSTIFICATION:

<none provided>

INTERACTION: Response

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 33

THREAT: Weak Access Control for a Resource

CATEGORY: Information Disclosure

DESCRIPTION:

Improper data protection of A can allow an attacker to read information not intended for
disclosure. Review authorization settings.
SHORT DESCRIPTION:Information disclosure happens when the information can be read by an
unauthorized party.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 12

THREAT: Weak Access Control for a Resource

CATEGORY: Information Disclosure

DESCRIPTION:

Improper data protection of PAGINA WEB EN DISCO can allow an attacker to read information not
intended for disclosure. Review authorization settings.

SHORT DESCRIPTION:Information disclosure happens when the information can be read by an


unauthorized party.

JUSTIFICATION:

<none provided>
INTERACTION: PAGINAS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 39

THREAT: Servidor May be Subject to Elevation of Privilege Using Remote Code


Execution

CATEGORY: Elevation Of Privilege

DESCRIPTION:

ADMINISTRADOR may be able to remotely execute code for Servidor.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 28

THREAT: Elevation by Changing the Execution Flow in SERVIDOR DE BD

CATEGORY: Elevation Of Privilege

DESCRIPTION:

An attacker may pass data into SERVIDOR DE BD in order to change the flow of program execution
within SERVIDOR DE BD to the attacker's choosing.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 10

THREAT: Elevation by Changing the Execution Flow in Servidor

CATEGORY: Elevation Of Privilege

DESCRIPTION:

An attacker may pass data into Servidor in order to change the flow of program execution within
Servidor to the attacker's choosing.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 20

THREAT: Elevation by Changing the Execution Flow in Servidor

CATEGORY: Elevation Of Privilege


DESCRIPTION:

An attacker may pass data into Servidor in order to change the flow of program execution within
Servidor to the attacker's choosing.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 40

THREAT: Elevation by Changing the Execution Flow in Servidor

CATEGORY: Elevation Of Privilege

DESCRIPTION:

An attacker may pass data into Servidor in order to change the flow of program execution within
Servidor to the attacker's choosing.
SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 26

THREAT: Elevation Using Impersonation

CATEGORY: Elevation Of Privilege

DESCRIPTION:

SERVIDOR DE BD may be able to impersonate the context of Servidor in order to gain additional
privilege.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>
INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 19

THREAT: Servidor May be Subject to Elevation of Privilege Using Remote Code


Execution

CATEGORY: Elevation Of Privilege

DESCRIPTION:

SERVIDOR DE BD may be able to remotely execute code for Servidor.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 38

THREAT: Elevation Using Impersonation

CATEGORY: Elevation Of Privilege

DESCRIPTION:

Servidor may be able to impersonate the context of ADMINISTRADOR in order to gain additional
privilege.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 18

THREAT: Elevation Using Impersonation

CATEGORY: Elevation Of Privilege

DESCRIPTION:

Servidor may be able to impersonate the context of SERVIDOR DE BD in order to gain additional
privilege.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 8

THREAT: Elevation Using Impersonation

CATEGORY: Elevation Of Privilege


DESCRIPTION:

Servidor may be able to impersonate the context of Usuario in order to gain additional privilege.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 27

THREAT: SERVIDOR DE BD May be Subject to Elevation of Privilege Using Remote


Code Execution

CATEGORY: Elevation Of Privilege

DESCRIPTION:

Servidor may be able to remotely execute code for SERVIDOR DE BD.


SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 9

THREAT: Servidor May be Subject to Elevation of Privilege Using Remote Code


Execution

CATEGORY: Elevation Of Privilege

DESCRIPTION:

Usuario may be able to remotely execute code for Servidor.

SHORT DESCRIPTION:A user subject gains increased capability or privilege by taking advantage of
an implementation bug.

JUSTIFICATION:

<none provided>
INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 3

THREAT: Data Flow Response Is Potentially Interrupted

CATEGORY: Denial Of Service

DESCRIPTION:

An external agent interrupts data flowing across a trust boundary in either direction.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: Response

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 7

THREAT: Data Flow REQUESTS Is Potentially Interrupted

CATEGORY: Denial Of Service

DESCRIPTION:

An external agent interrupts data flowing across a trust boundary in either direction.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 17

THREAT: Data Flow DATOS Is Potentially Interrupted

CATEGORY: Denial Of Service

DESCRIPTION:

An external agent interrupts data flowing across a trust boundary in either direction.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 25

THREAT: Data Flow CONSULTA SQL Is Potentially Interrupted

CATEGORY: Denial Of Service


DESCRIPTION:

An external agent interrupts data flowing across a trust boundary in either direction.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 37

THREAT: Data Flow REQUESTS Is Potentially Interrupted

CATEGORY: Denial Of Service

DESCRIPTION:

An external agent interrupts data flowing across a trust boundary in either direction.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.
JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 43

THREAT: Data Flow Response Is Potentially Interrupted

CATEGORY: Denial Of Service

DESCRIPTION:

An external agent interrupts data flowing across a trust boundary in either direction.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: Response

DIAGRAM: Diagram 1
CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 31

THREAT: Potential Excessive Resource Consumption for SERVIDOR DE BD or A

CATEGORY: Denial Of Service

DESCRIPTION:

Does SERVIDOR DE BD or A take explicit steps to control resource consumption? Resource


consumption attacks can be hard to deal with, and there are times that it makes sense to let the
OS do the job. Be careful that your resource requests don't deadlock, and that they do timeout.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>
LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 6

THREAT: Potential Process Crash or Stop for Servidor

CATEGORY: Denial Of Service

DESCRIPTION:

Servidor crashes, halts, stops or runs slowly; in all cases violating an availability metric.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High
ID: 16

THREAT: Potential Process Crash or Stop for Servidor

CATEGORY: Denial Of Service

DESCRIPTION:

Servidor crashes, halts, stops or runs slowly; in all cases violating an availability metric.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: DATOS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 36

THREAT: Potential Process Crash or Stop for Servidor

CATEGORY: Denial Of Service


DESCRIPTION:

Servidor crashes, halts, stops or runs slowly; in all cases violating an availability metric.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.

JUSTIFICATION:

<none provided>

INTERACTION: REQUESTS

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

ID: 24

THREAT: Potential Process Crash or Stop for SERVIDOR DE BD

CATEGORY: Denial Of Service

DESCRIPTION:

SERVIDOR DE BD crashes, halts, stops or runs slowly; in all cases violating an availability metric.

SHORT DESCRIPTION:Denial of Service happens when the process or a datastore is not able to
service incoming requests or perform up to spec.
JUSTIFICATION:

<none provided>

INTERACTION: CONSULTA SQL

DIAGRAM: Diagram 1

CHANGED BY:

<none provided>

LAST MODIFIED:

Generated

STATE: Not Started

PRIORITY: High

También podría gustarte