💵
ITU DFS Security Assurance Framework
  • Acronyms
  • Executive Summary
  • Introduction
  • ITU-T Recommendation X.805 Overview
  • DFS Provider Business Models
  • Elements of DFS ecosystem
  • Security threats
  • DFS Security Assurance Framework
    • Risk assessment methodology
      • Assessment of DFS security vulnerabilities, threats and mitigation Measures
  • DFS security vulnerabilities, threats and mitigation Measures In order to systematical
    • Account and Session Hijacking
    • Attacks against systems and platforms
    • Code Exploitation Attacks
    • Data Misuse
    • Denial of Service Attacks
    • Insider Attacks
    • Man-in-the-middle and social engineering attacks
    • Compromise of DFS Infrastructure
    • Compromise of DFS Services
    • SIM attacks
    • Unauthorized access to DFS data
    • Malware
    • Rogue Devices
    • Unauthorised Access to Mobile Devices
    • Unintended Disclosure of Personal Information
    • Zero-Day Attacks
    • Attacks against credentials
Powered by GitBook
On this page
  1. DFS security vulnerabilities, threats and mitigation Measures In order to systematical

Compromise of DFS Services

The ability of an attacker to breach a financial service without being detected.

Affected entity: DFS provider

Risk: Service failure and compromise of DFS services

  • Vulnerability: Unauthorized changes to system configuration and log files and data (SD: Data Integrity)

  • Vulnerability: Insufficient user access validation or user input validation (SD: Authentication)

  • Vulnerability: Inadequate user access validation or user input validation (SD: Authentication)

PreviousCompromise of DFS InfrastructureNextSIM attacks

Last updated 2 years ago