Web application security - the fast guide 1.1 | Page 50
Chapter 3 - Vulnerabilities and threat models
P a g e | 50
3.3 Threats and vulnerabilities models -IIMF
known method for categorizing threats where IIMF is an acronym combined of
the first letter of the following categories:
1- Interruption: intercept and prevent the access to information or denial of
the service.
2- Interception: capture information like network traffic or any confidential
information.
3- Modification: alter captured information like network packet source or
content like user name.
4- Fabrication: spoofing identity, relay altered information.
Normal flow Interruption
Interception Fabrication
Figure 21: IIMF model
3.4 Threats and vulnerabilities models - CIA
Where IIMF focuses on the threat itself the CIA method approaches it from the
system aspect perspective where (C) represents Confidentiality, (I) represents
Integrity and (A) the availability.
3.4.1 Confidentiality:
the application focus on preventing any disclosure of private or important
information that can represent an asset or that might be used to compromise an
asset.
Confidentiality mainly reached through cryptography, authorization and
authentication techniques.