💵
ITU DFS Security Assurance Framework
  • Acronyms
  • Executive Summary
  • Introduction
  • ITU-T Recommendation X.805 Overview
  • DFS Provider Business Models
  • Elements of DFS ecosystem
  • Security threats
  • DFS Security Assurance Framework
    • Risk assessment methodology
      • Assessment of DFS security vulnerabilities, threats and mitigation Measures
  • DFS security vulnerabilities, threats and mitigation Measures In order to systematical
    • Account and Session Hijacking
    • Attacks against systems and platforms
    • Code Exploitation Attacks
    • Data Misuse
    • Denial of Service Attacks
    • Insider Attacks
    • Man-in-the-middle and social engineering attacks
    • Compromise of DFS Infrastructure
    • Compromise of DFS Services
    • SIM attacks
    • Unauthorized access to DFS data
    • Malware
    • Rogue Devices
    • Unauthorised Access to Mobile Devices
    • Unintended Disclosure of Personal Information
    • Zero-Day Attacks
    • Attacks against credentials
Powered by GitBook
On this page
  • Affected entity: MNO
  • Affected entity: DFS Provider
  1. DFS security vulnerabilities, threats and mitigation Measures In order to systematical

Denial of Service Attacks

We characterize these attacks as being designed to prevent services within the DFS ecosystem from being offered.

Affected entity: MNO

Risk: Inability to perform a transaction as a result of service outage and transaction failure, high transaction delays.

  • Vulnerability: Network failure due to insufficient network capacity or to maintenance or design (SD: availability)

  • Vulnerability: Network failure due to insufficient network capacity or to maintenance or design (SD: availability)

Affected entity: DFS Provider

  • Vulnerability: Inadequate monitoring of network traffic and packets (SD: availability, communication security)

  • Vulnerability: Enabling unnecessary services (SD: data confidentiality)

  • Vulnerability: Enabling unnecessary services (SD: data confidentiality)

PreviousData MisuseNextInsider Attacks

Last updated 2 years ago