💵
ITU DFS Security Assurance Framework
  • Acronyms
  • Executive Summary
  • Introduction
  • ITU-T Recommendation X.805 Overview
  • DFS Provider Business Models
  • Elements of DFS ecosystem
  • Security threats
  • DFS Security Assurance Framework
    • Risk assessment methodology
      • Assessment of DFS security vulnerabilities, threats and mitigation Measures
  • DFS security vulnerabilities, threats and mitigation Measures In order to systematical
    • Account and Session Hijacking
    • Attacks against systems and platforms
    • Code Exploitation Attacks
    • Data Misuse
    • Denial of Service Attacks
    • Insider Attacks
    • Man-in-the-middle and social engineering attacks
    • Compromise of DFS Infrastructure
    • Compromise of DFS Services
    • SIM attacks
    • Unauthorized access to DFS data
    • Malware
    • Rogue Devices
    • Unauthorised Access to Mobile Devices
    • Unintended Disclosure of Personal Information
    • Zero-Day Attacks
    • Attacks against credentials
Powered by GitBook
On this page
  • Affected entity: MNO
  • Affected entity: DFS Provider and Third-party providers
  1. DFS security vulnerabilities, threats and mitigation Measures In order to systematical

Data Misuse

Threats relating to the mishandling of sensitive customer data

Affected entity: MNO

Risk: Unauthorized access to user data and interception of data in transit.

  • Vulnerability: Weak encryption practices or sending sensitive information in clear text over insecure traffic channels like SMS and USSD (SD: communication security)

Affected entity: DFS Provider and Third-party providers

Risk: Exposure of Sensitive data

  • Vulnerability: Inadequate data protection controls (SD: privacy)

Risk: Exposure of customer sensitive information during transactions or through APIs (SD: privacy)

  • Control 5.3: DFS providers should restrict the sharing of information to be only the minimum amount required for transactions with third parties and service providers

  • Vulnerability: Weak encryption on the API interfaces (SD: privacy)

PreviousCode Exploitation AttacksNextDenial of Service Attacks

Last updated 2 years ago