Web application security - the fast guide 1.1 | Page 53

Chapter 3 - Vulnerabilities and threat models P a g e | 53
3.5.5 Denial of service :
one of the main threats is related to affecting the availability of the service itself so it is about bringing the ( site , application or service down ). This threat realizes by simply consuming application available resources by heavy requests for big files , Queries or searches or even depending on the generation of big number of requests if the application does not provide facet to run individual heavy requests .
3.5.6 Elevation of privileges :
in an application each user will have a specific role with specific privileges . The malicious acts for a user to elevate his / her privileges considered to be one of the big threats as it will give potential attackers the ability sometimes to totally control and takeover the application .
3.6 Threats and vulnerabilities models - DREAD
Another effective method commonly used to classify threat is to depend on finding a quantitative value that represents the risk . The risk value is calculated based on the estimated values of the following factors :
Damage potential : refers to the level of caused damage if the threat was exploited . Level is estimated as follow :
Level
No Damage
User Data is compromised or affected
Complete destruction of Data or System
Value
0
5
10
Reproducibility : This factor is related to how easy is to reproduce the threat exploit :
Level
Very hard to reproduce
One or two steps to reproduce
Easy to reproduce
Value
0
5
10
Exploitability : needed tools , knowledge , techniques for the threat exploit .
Level
Advance Knowledge and advanced tools
Available tool and easy to perform
Very simple tool
( only browser )
Value
0
5
10
Affected user : refers to users that are affected by the threat .
Level
None
Some users
All Users
Value
0
5
10