Security/ProcessIsolation/ThreatModel: Difference between revisions

Line 36: Line 36:
*theft of local and network files via file:// and related schemes
*theft of local and network files via file:// and related schemes
*theft of local data via direct access to database or database files
*theft of local data via direct access to database or database files
==== Assets at Risk ====
* local files, registry entries, etc.
* network files (NFS, SMB)
* intranet servers / services


==Cross-domain Compromise==
==Cross-domain Compromise==
Confirmed users
717

edits