Table 11.
MitM Scenario | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GR-1 | GR-2 | ||||||||||||
Security Tactic | GT | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 | S9 | S10 | S11 | S12 |
Detect Attacks | |||||||||||||
Detect Intrusion | 0 | 1 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Detect Service Denial | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Verify Message Integrity | 1 | 1 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Detect Message Delivery Anomalies |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
Resist Attacks | |||||||||||||
Identify Actors | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 0 |
Authenticate Actors | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Authorize Actors | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Limit Access | 0 | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 0 | 1 | 1 | 0 | 0 |
Limit Exposure | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 0 |
Encrypt Data | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 |
Separate Entities | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Validate Input | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 0 |
Change Credential Settings |
0 | 1 | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 1 | 1 | 1 |
React to Attacks | |||||||||||||
Revoke Access | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 1 | 1 | 1 | 0 | 0 |
Restrict Login | 0 | 1 | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 1 | 1 | 0 |
Inform Actors | 1 | 0 | 1 | 1 | 0 | 1 | 1 | 0 | 0 | 0 | 1 | 0 | 0 |
Recover from Attacks | |||||||||||||
Audit | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Non-repudiation | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 1 | 1 |
∑ | 7 | 8 | 6 | 3 | 7 | 8 | 8 | 4 | 7 | 7 | 3 | 3 | |
0.39 | 0.44 | 0.33 | 0.17 | 0.39 | 0.44 | 0.44 | 0.22 | 0.39 | 0.39 | 0.17 | 0.17 | ||
Avg. (juniors) | 0.33 | 0.28 | |||||||||||
Avg. (seniors) | 0.39 | 0.31 | |||||||||||
Total Avg. | 0.36 | 0.3 |