Table 11 Output of informal analysis.
Type of threat | Status (of Vulnerability) | Reason observed | Suggested Action |
---|---|---|---|
Backdoor | No | Verification of authenticity | Not required. |
DoS Attack | Partially No | Handles low DoS, Degrades in high volume. | Apply limit on connections. |
Injections | No | Detection of modifications | Not required. |
Replay attack | Yes | Repeated requests are accepted. | Timestamps or session tokens should be used. |