Threat

Description

Spoofing Identity

An attacker poses as an authorized user by taking or faking an identity of another person.

Tampering with Data

An attacker modifies some information in the system by changing a data item.

Repudiation

An attacker deletes a transaction to cover up and deny his intrusion into the system.

Information Disclosure

Personal user data is stolen and sold to a competitor with an intent to make profit.

Denial of Service (DoS)

An attacker exhausts network resources to make it inaccessible to its intended users.

Elevation of Privilege (EoP)

An attacker, instead of spoofing identity, just elevates his own security level to an administrator.