48.1k views
3 votes
STRIDE Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege

a) Types of malware
b) Threat modeling categories
c) Incident response steps
d) Network security protocols

1 Answer

3 votes

Final answer:

Hackers use various tactics such as spoofing to gain unauthorized access and steal sensitive information for different malicious purposes. Implementing network security protocols, conducting threat modelling, and practicing incident response steps can help reduce or prevent hacking incidents.

Step-by-step explanation:

Hackers use a variety of tactics to gain unauthorized access to systems and networks. One common tactic utilized by hackers is Spoofing, which involves pretending to be someone or something else to trick people or systems into providing sensitive information. With the stolen information, hackers can commit various types of crimes, such as identity theft or financial theft. They may also exploit vulnerabilities in a system to cause denial of service attacks, disrupt operations, or gain elevation of privilege. Hacking can be reduced or stopped by implementing robust network security protocols, conducting regular threat modelling to identify vulnerabilities, and practicing effective incident response steps.

User Amin Memariani
by
7.8k points