-
Book Overview & Buying
-
Table Of Contents
Threat Modeling
By :
Many of these threats are threats to logging, as logging is an essential part of non-repudiation. Repudiation threats are often an interesting foil for requirements, but they are covered less well by Elevation of Privilege.
2 of Repudiation. An attacker can pass data through the log to attack a log reader, and there's no documentation regarding what sorts of validation are done. Attackers can be distinguished by what data elements they can insert. Any web user can insert a URL into your HTTP logs by requesting it. The time stamp field is under the control of (a possibly subverted) web server. Your logs should distinguish who can write what.
3 of Repudiation. A low privilege attacker can read interesting security information in the logs. You should ensure that interesting security information is stored in logs that are protected.
4 of Repudiation. An attacker can alter digital signatures because the digital signature system you're implementing is weak, or uses MACs...
Change the font size
Change margin width
Change background colour