Confirmed users
717
edits
Line 16: | Line 16: | ||
* flaws in system services could be exploited from an isolated process | * flaws in system services could be exploited from an isolated process | ||
=== System Data Theft === | === System / Local Network Data Theft === | ||
Ability to steal data from the local | Ability to steal data from the system or local network. A subset of the System Compromise category. | ||
<b>Threats</b> | |||
* a compromised privileged process would steal data from the system and local network | |||
* an isolated process could trick a privileged process to perform an attack on its behalf (read an arbitrary file from the system or local network) | |||
* an isolated process can still open network connections to steal data from or attack local systems | |||
=== Cross-domain Compromise === | === Cross-domain Compromise === |