Threat I.Auth.HSRSoGS.3

URI: I.Auth.HSRSoGS.3

Package: NetworkConnectivity

< prev | next >

Description: Spoofing radio network LogicalSubnet at location Space of supplicant Host: at attacker with access to the location Space of Host can physically spoof network LogicalSubnet by introducing their own radio base station to impersonate the real one.

Threat Type: Primary Threat

Matching Pattern:

I.Auth.HSRSoGS.3
MP-HSRSoGS

Finds a host located in a space connecting to a radio subnet that is not a hotspot, plus optionally the controlling host and service for the subnet.

        (empty)

        (empty)

        (empty)

CSG-IgnorePhysicalThreatsFromWorld

Indicates that threats from as well as to the space Space can be ignored, i.e. that the risk model intentionally does not consider physical attacks from Space. This is only permitted if Space is the inferred global public space (the World) used when no locations are asserted in the model. This control strategy is a way to specify that physical security is out of scope for devices with no explicitly specified location(s), i.e. that they are considered physically secure.

CSG-NetworkAuthN-PSK-Optional

To prevent network spoofing, a gateway Gateway providing the network and the supplicant device Host can use a pre-shared key that can be verified by Host.

CSG-NetworkAuthN-X509-Optional

To prevent network spoofing, a gateway Gateway providing the network can use an X509 (or otherwise trusted) key pair, verified by the supplicant device Host.