Chapter#1: Security Governance
Question that I found interesting:
Microsoft's STRIDE threat assessment framework uses six categories for threats: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. If a penetration tester is able to modify audit logs, what STRIDE categories best describe this issue?
A#Tampering and information disclosure
B#Elevation of privilege and tampering
C#Repudiation and denial of service
D#Repudiation and tampering
A#Tampering and information disclosure
B#Elevation of privilege and tampering
C#Repudiation and denial of service
D#Repudiation and tampering
11 votes
3
1 comment
Dmitriy Kovbasko
3
Chapter#1: Security Governance
CISSP Study Group
skool.com/cissp
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
powered by