Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

The security concept is separated into two parts: the vulnerabilities of the Flarecast infrastructure and the protection of confidential resources.

Infrastructure valnerabilities

The first part concerns attacks against the infrastructure from external or internal sources. This includes any kind of vectors including data manipulation as well as service disruption.
The following table gives a summary of such attack vectors, there risk and impact level as well as possible countermeasures.

Attack VectorDescriptionRisk LevelImpact LevelCountermeasure
Attacks concerning general web applications   
Cross-site request forgery (XSRF, CSRF)Victim has an open VPN session and runs a malicious script from an attacker's server1  
     

The above attack vectors are barely addressed for two reasons:

-

Authentification mechanisms

  • No labels