Match term to threat Term Matching Threat Spoofing preventi
Match term to threat:
Term
Matching #
Threat
Spoofing
preventing a legitimate user from accessing a service
Man-in-the-middle
accessing message parts such as credit card info
Confidentiality
modifying the message content
Denial of Service
interception of messages and playing to back to the service
Replay Attacks
establishing complete access to messages
Message Alteration
exploiting trusted relationships
| Term | Matching # | Threat | 
| Spoofing | preventing a legitimate user from accessing a service | |
| Man-in-the-middle | accessing message parts such as credit card info | |
| Confidentiality | modifying the message content | |
| Denial of Service | interception of messages and playing to back to the service | |
| Replay Attacks | establishing complete access to messages | |
| Message Alteration | exploiting trusted relationships | 
Solution
Spoofing: establishing complete access to messages.
Man-in-the-middle: accessing message parts such as credit card info.
Confidentiality: exploiting trusted relationships.
Denial of Service: preventing a legitimate user from accessing a service.
Replay Attacks: interception of messages and playing to back to the service.
Message Alteration: modifying the message content.

