Skip to content

Commit 4abe2cc

Browse files
committed
review-1
1 parent 09aafc6 commit 4abe2cc

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/2-spoofing-pretending-to-be-someone-or-something-else.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,12 @@ quiz:
1616
questions:
1717
- content: "Which statement describes a potential security control against spoofing?"
1818
choices:
19-
- content: "Sender digitally signs a message so the receiver knows who the message came from"
19+
- content: "Sender digitally signs a message so the receiver knows who the message came from."
2020
isCorrect: true
21-
explanation: "This message applies to spoofing"
22-
- content: "System logs all actions and users to keep everyone accountable"
21+
explanation: "This message applies to spoofing."
22+
- content: "System logs all actions and users to keep everyone accountable."
2323
isCorrect: false
24-
explanation: "This statement applies to repudiation"
25-
- content: "System grants administrative access to users listed on the access control list"
24+
explanation: "This statement applies to repudiation."
25+
- content: "System grants administrative access to users listed on the access control list."
2626
isCorrect: false
27-
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege "
27+
explanation: "This statement applies to tampering, information disclosure, denial of service and elevation of privilege."

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Using the framework, you're able to answer questions like:
1919
- How do I know someone can't change data in transit, in use, or at rest?
2020
- Can every action be tied to an identity?
2121
- How do I know someone can't see data in transit, in use, or at rest?
22-
- Are there areas in the system where resource is limited?
22+
- Are there areas in the system where resources are limited?
2323
- How do I know someone is allowed to take this action?
2424

2525
In this module, you learn about each threat category and its corresponding security controls.

learn-pr/azure/tm-use-a-framework-to-identify-threats-and-find-ways-to-reduce-or-eliminate-risk/includes/2-spoofing-pretending-to-be-someone-or-something-else.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Examples include:
44

55
- An attacker sends an email to users from an account that seems legitimate with malicious links and attachments to capture their credentials, data, and device access.
6-
- An attacker spoofs SSIDs and IP addresses while using open and inherently insecure TCP/IP protocols to send malicious payloads to victims.
6+
- An attacker spoofs Service Set Identifiers (SSIDs) and IP addresses while using open and inherently insecure TCP/IP protocols to send malicious payloads to victims.
77

88
## Elements and interactions at risk from spoofing attacks
99

@@ -29,8 +29,8 @@ Examples include:
2929
Examples include:
3030

3131
- Sending and receiving messages signed with digital signatures to authenticate origin and ensure message integrity.
32-
- Securing data transmissions with SSL/TLS to encrypt traffic between source and target.
33-
- The use of unique credentials with expiring tokens, passwords, or multi-factor authentication to help secure user, admin, and service accounts.
32+
- Securing data transmissions with TLS/SSL to encrypt traffic between source and target.
33+
- The use of unique credentials with expiring tokens, passwords, or multifactor authentication to help secure user, admin, and service accounts.
3434

3535
### Common security controls to reduce or eliminate risk
3636

@@ -45,7 +45,7 @@ For your system:
4545
- User Authentication
4646
- Cookie Authentication
4747
- Kerberos
48-
- SSL/TLS
48+
- TLS/SSL
4949
- Certificates
5050
- IPSec
5151
- Digitally Signed Packets

0 commit comments

Comments
 (0)