Produced by Araxis Merge on 9/9/2019 5:41:27 PM Eastern Daylight Time. See www.araxis.com for information about Merge. This report uses XHTML and CSS2, and is best viewed with a modern standards-compliant browser. For optimum results when printing this report, use landscape orientation and enable printing of background images and colours in your browser.
# | Location | File | Last Modified |
---|---|---|---|
1 | Webvram-v4.zip\20190725-webvram-source.zip\Documents\VA SwA Threat Model WebVRAM v2.1.0 20170602-1 | VA SwA Threat Model WebVRAM v2.1.0 20170602-1.tm7 | Tue Jul 23 23:11:38 2019 UTC |
2 | Webvram-v4.zip\20190725-webvram-source.zip\Documents\VA SwA Threat Model WebVRAM v2.1.0 20170602-1 | VA SwA Threat Model WebVRAM v2.1.0 20170602-1.tm7 | Mon Sep 9 17:51:30 2019 UTC |
Description | Between Files 1 and 2 |
|
---|---|---|
Text Blocks | Lines | |
Unchanged | 1 | 240 |
Changed | 1 | 2 |
Inserted | 0 | 0 |
Removed | 0 | 0 |
Whitespace | |
---|---|
Character case | Differences in character case are significant |
Line endings | Differences in line endings (CR and LF characters) are ignored |
CR/LF characters | Not shown in the comparison detail |
No regular expressions were active.
1 | <ThreatMod el xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model " xmlns:i= "http://ww w.w3.org/2 001/XMLSch ema-instan ce"><Drawi ngSurfaceL ist><Drawi ngSurfaceM odel z:Id= "i1" xmlns :z="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/"><Ge nericTypeI d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >DRAWINGSU RFACE</Gen ericTypeId ><Guid xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">2307 879a-6671- 439b-a5af- 99571be4ea 24</Guid>< Properties xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts" xmlns:a="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><a :anyType i :type="b:H eaderDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Dia gram</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:Strin gDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Name</b :DisplayNa me><b:Name /><b:Value i:type="c :string" x mlns:c="ht tp://www.w 3.org/2001 /XMLSchema ">Sample</ b:Value></ a:anyType> </Properti es><TypeId xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> DRAWINGSUR FACE</Type Id><Border s xmlns:a= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <a:KeyValu eOfguidany Type><a:Ke y>dba68d15 -1668-4546 -8060-05a5 04ef180c</ a:Key><a:V alue z:Id= "i2" i:typ e="Stencil Rectangle" ><GenericT ypeId xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">GE.A< /GenericTy peId><Guid xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> dba68d15-1 668-4546-8 060-05a504 ef180c</Gu id><Proper ties xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts"><a:any Type i:typ e="b:Heade rDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Free Te xt Annotat ion</b:Dis playName>< b:Name/><b :Value i:n il="true"/ ></a:anyTy pe><a:anyT ype i:type ="b:String DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Name</b: DisplayNam e><b:Name/ ><b:Value i:type="c: string" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" >FIXME: TH IS IS ONLY A DRAFT D IAGRAM, TO HELP GET STARTED US ING THE MI CROSOFT TH REAT MODEL ING TOOL. READ MORE: "How do I update th e initial diagrams?" https://w iki.mobile health.va. gov/displa y/OISSWA/T echnical+N otes</b:Va lue></a:an yType><a:a nyType i:t ype="b:Boo leanDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Out Of Scope</ b:DisplayN ame><b:Nam e>71f3d9aa -b8ef-4e54 -8126-607a 1d903103</ b:Name><b: Value i:ty pe="c:bool ean" xmlns :c="http:/ /www.w3.or g/2001/XML Schema">fa lse</b:Val ue></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Reason For Out O f Scope</b :DisplayNa me><b:Name >752473b6- 52d4-4776- 9a24-20215 3f7d579</b :Name><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema"/></a :anyType>< /Propertie s><TypeId xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">G E.A</TypeI d><Height xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">1 00</Height ><Left xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">10</ Left><Stro keDashArra y i:nil="t rue" xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts"/><Stro keThicknes s xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >1</Stroke Thickness> <Top xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">10</To p><Width x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">73 2</Width>< /a:Value>< /a:KeyValu eOfguidany Type><a:Ke yValueOfgu idanyType> <a:Key>981 17272-0a8b -4ea7-81ea -4e1e9fd68 786</a:Key ><a:Value z:Id="i3" i:type="Bo rderBounda ry"><Gener icTypeId x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">GE .TB.B</Gen ericTypeId ><Guid xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">9811 7272-0a8b- 4ea7-81ea- 4e1e9fd687 86</Guid>< Properties xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> <a:anyType i:type="b :HeaderDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>G eneric Tru st Border Boundary</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Nam e</b:Displ ayName><b: Name/><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema">Appl ication Tr ust Bounda ry</b:Valu e></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.TB. B</TypeId> <Height xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">178 </Height>< Left xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">311</L eft><Strok eDashArray i:nil="tr ue" xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s"/><Strok eThickness xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 1</StrokeT hickness>< Top xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">205</To p><Width x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">17 4</Width>< /a:Value>< /a:KeyValu eOfguidany Type><a:Ke yValueOfgu idanyType> <a:Key>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</a:Key ><a:Value z:Id="i4" i:type="St encilEllip se"><Gener icTypeId x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">GE .P</Generi cTypeId><G uid xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /Guid><Pro perties xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts"><a: anyType i: type="b:He aderDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Web Applicatio n</b:Displ ayName><b: Name/><b:V alue i:nil ="true"/>< /a:anyType ><a:anyTyp e i:type=" b:StringDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Name</b:Di splayName> <b:Name/>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema">W ebVRAM</b: Value></a: anyType><a :anyType i :type="b:B ooleanDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Ou t Of Scope </b:Displa yName><b:N ame>71f3d9 aa-b8ef-4e 54-8126-60 7a1d903103 </b:Name>< b:Value i: type="c:bo olean" xml ns:c="http ://www.w3. org/2001/X MLSchema"> false</b:V alue></a:a nyType><a: anyType i: type="b:St ringDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Reas on For Out Of Scope< /b:Display Name><b:Na me>752473b 6-52d4-477 6-9a24-202 153f7d579< /b:Name><b :Value i:t ype="c:str ing" xmlns :c="http:/ /www.w3.or g/2001/XML Schema"/>< /a:anyType ><a:anyTyp e i:type=" b:HeaderDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Predefined Static At tributes</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:S taticListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Code Type </b:Displa yName><b:N ame>codeTy pe</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Unman aged</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Configur able Attri butes</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:Head erDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>As Gen eric Proce ss</b:Disp layName><b :Name/><b: Value i:ni l="true"/> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>R unning As< /b:Display Name><b:Na me>running As</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Not S elected</a :string><a :string>Ke rnel</a:st ring><a:st ring>Syste m</a:strin g><a:strin g>Network Service</a :string><a :string>Lo cal Servic e</a:strin g><a:strin g>Administ rator</a:s tring><a:s tring>Stan dard User With Eleva tion</a:st ring><a:st ring>Stand ard User W ithout Ele vation</a: string><a: string>Win dows Store App</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Isolation Level</b:D isplayName ><b:Name>I solation</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Selec ted</a:str ing><a:str ing>AppCon tainer</a: string><a: string>Low Integrity Level</a: string><a: string>Mic rosoft Off ice Isolat ed Convers ion Enviro nment (MOI CE)</a:str ing><a:str ing>Sandbo x</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Acc epts Input From</b:D isplayName ><b:Name>a cceptsInpu tFrom</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No t Selected </a:string ><a:string >Any Remot e User or Entity</a: string><a: string>Ker nel, Syste m, or Loca l Admin</a :string><a :string>Lo cal or Net work Servi ce</a:stri ng><a:stri ng>Local S tandard Us er With El evation</a :string><a :string>Lo cal Standa rd User Wi thout Elev ation</a:s tring><a:s tring>Wind ows Store Apps or Ap p Containe r Processe s</a:strin g><a:strin g>Nothing< /a:string> <a:string> Other</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Implement s or Uses an Authent ication Me chanism</b :DisplayNa me><b:Name >implement sAuthentic ationSchem e</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Impl ements or Uses an Au thorizatio n Mechanis m</b:Displ ayName><b: Name>imple mentsCusto mAuthoriza tionMechan ism</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Im plements o r Uses a C ommunicati on Protoco l</b:Displ ayName><b: Name>imple mentsCommu nicationPr otocol</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Sanitizes Input</b: DisplayNam e><b:Name> hasInputSa nitizers</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Selec ted</a:str ing><a:str ing>Yes</a :string><a :string>No </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Sani tizes Outp ut</b:Disp layName><b :Name>hasO utputSanit izers</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No t Selected </a:string ><a:string >Yes</a:st ring><a:st ring>No</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType></Pr operties>< TypeId xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">SE.P .TMCore.We bApp</Type Id><Height xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 100</Heigh t><Left xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">349 </Left><St rokeDashAr ray i:nil= "true" xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts"/><St rokeThickn ess xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">1</Stro keThicknes s><Top xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">253< /Top><Widt h xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >100</Widt h></a:Valu e></a:KeyV alueOfguid anyType><a :KeyValueO fguidanyTy pe><a:Key> 322b3360-c f25-454c-a 328-a52ac3 b88c0a</a: Key><a:Val ue z:Id="i 5" i:type= "StencilRe ctangle">< GenericTyp eId xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">GE.EI</ GenericTyp eId><Guid xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">3 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a</Gui d><Propert ies xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s"><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Browser< /b:Display Name><b:Na me/><b:Val ue i:nil=" true"/></a :anyType>< a:anyType i:type="b: StringDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Na me</b:Disp layName><b :Name/><b: Value i:ty pe="c:stri ng" xmlns: c="http:// www.w3.org /2001/XMLS chema">Bro wser</b:Va lue></a:an yType><a:a nyType i:t ype="b:Boo leanDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Out Of Scope</ b:DisplayN ame><b:Nam e>71f3d9aa -b8ef-4e54 -8126-607a 1d903103</ b:Name><b: Value i:ty pe="c:bool ean" xmlns :c="http:/ /www.w3.or g/2001/XML Schema">fa lse</b:Val ue></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Reason For Out O f Scope</b :DisplayNa me><b:Name >752473b6- 52d4-4776- 9a24-20215 3f7d579</b :Name><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema"/></a :anyType>< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Pr edefined S tatic Attr ibutes</b: DisplayNam e><b:Name/ ><b:Value i:nil="tru e"/></a:an yType><a:a nyType i:t ype="b:Sta ticListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>T ype</b:Dis playName>< b:Name>typ e</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Code</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:He aderDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Conf igurable A ttributes< /b:Display Name><b:Na me/><b:Val ue i:nil=" true"/></a :anyType>< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>As Generic E xternal In teractor</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Authe nticates I tself</b:D isplayName ><b:Name>a uthenticat esItself</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Appli cable</a:s tring><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Mi crosoft</b :DisplayNa me><b:Name >MS</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ></Propert ies><TypeI d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >SE.EI.TMC ore.Browse r</TypeId> <Height xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">100 </Height>< Left xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">118</L eft><Strok eDashArray i:nil="tr ue" xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s"/><Strok eThickness xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 1</StrokeT hickness>< Top xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">248</To p><Width x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">10 0</Width>< /a:Value>< /a:KeyValu eOfguidany Type><a:Ke yValueOfgu idanyType> <a:Key>5ae 6e1e4-d1d8 -4306-9e99 -8896c7977 524</a:Key ><a:Value z:Id="i6" i:type="St encilRecta ngle"><Gen ericTypeId xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> GE.EI</Gen ericTypeId ><Guid xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">5ae6 e1e4-d1d8- 4306-9e99- 8896c79775 24</Guid>< Properties xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> <a:anyType i:type="b :HeaderDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>G eneric Ext ernal Inte ractor</b: DisplayNam e><b:Name/ ><b:Value i:nil="tru e"/></a:an yType><a:a nyType i:t ype="b:Str ingDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Name< /b:Display Name><b:Na me/><b:Val ue i:type= "c:string" xmlns:c=" http://www .w3.org/20 01/XMLSche ma">Attach mate Refle ction Appl ication</b :Value></a :anyType>< a:anyType i:type="b: BooleanDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>O ut Of Scop e</b:Displ ayName><b: Name>71f3d 9aa-b8ef-4 e54-8126-6 07a1d90310 3</b:Name> <b:Value i :type="c:b oolean" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" >false</b: Value></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Rea son For Ou t Of Scope </b:Displa yName><b:N ame>752473 b6-52d4-47 76-9a24-20 2153f7d579 </b:Name>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema"/> </a:anyTyp e><a:anyTy pe i:type= "b:HeaderD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Configura ble Attrib utes</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Authentic ates Itsel f</b:Displ ayName><b: Name>authe nticatesIt self</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>Not Applicabl e</a:strin g><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Type</ b:DisplayN ame><b:Nam e>type</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N ot Selecte d</a:strin g><a:strin g>Code</a: string><a: string>Hum an</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Mi crosoft</b :DisplayNa me><b:Name >MS</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ></Propert ies><TypeI d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >GE.EI</Ty peId><Heig ht xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">100</Hei ght><Left xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">1 21</Left>< StrokeDash Array i:ni l="true" x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts"/>< StrokeThic kness xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">1</St rokeThickn ess><Top x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">36 4</Top><Wi dth xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">100</Wi dth></a:Va lue></a:Ke yValueOfgu idanyType> <a:KeyValu eOfguidany Type><a:Ke y>67d57081 -a947-4301 -b3b2-9d4d 633203cb</ a:Key><a:V alue z:Id= "i7" i:typ e="Stencil ParallelLi nes"><Gene ricTypeId xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">G E.DS</Gene ricTypeId> <Guid xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">67d57 081-a947-4 301-b3b2-9 d4d633203c b</Guid><P roperties xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>SQ L Database </b:Displa yName><b:N ame/><b:Va lue i:nil= "true"/></ a:anyType> <a:anyType i:type="b :StringDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>N ame</b:Dis playName>< b:Name/><b :Value i:t ype="c:str ing" xmlns :c="http:/ /www.w3.or g/2001/XML Schema">We bVRAM Data base</b:Va lue></a:an yType><a:a nyType i:t ype="b:Boo leanDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Out Of Scope</ b:DisplayN ame><b:Nam e>71f3d9aa -b8ef-4e54 -8126-607a 1d903103</ b:Name><b: Value i:ty pe="c:bool ean" xmlns :c="http:/ /www.w3.or g/2001/XML Schema">fa lse</b:Val ue></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Reason For Out O f Scope</b :DisplayNa me><b:Name >752473b6- 52d4-4776- 9a24-20215 3f7d579</b :Name><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema"/></a :anyType>< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Pr edefined S tatic Attr ibutes</b: DisplayNam e><b:Name/ ><b:Value i:nil="tru e"/></a:an yType><a:a nyType i:t ype="b:Sta ticListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>S tore Type< /b:Display Name><b:Na me>storeTy pe</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>SQL R elational Database</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:He aderDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Conf igurable A ttributes< /b:Display Name><b:Na me/><b:Val ue i:nil=" true"/></a :anyType>< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>As Generic D ata Store< /b:Display Name><b:Na me/><b:Val ue i:nil=" true"/></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Stor es Credent ials</b:Di splayName> <b:Name>st oresCreden tials</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No </a:string ><a:string >Yes</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Stores Log Data</b:D isplayName ><b:Name>s toresLogDa ta</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>No</a :string><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Enc rypted</b: DisplayNam e><b:Name> Encrypted< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Signed </b:Displa yName><b:N ame>Signed </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Write Access</b :DisplayNa me><b:Name >AccessTyp e</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Remo vable Stor age</b:Dis playName>< b:Name>Rem oveableSto rage</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>No< /a:string> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >0</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>B ackup</b:D isplayName ><b:Name>B ackup</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No </a:string ><a:string >Yes</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Shared</b: DisplayNam e><b:Name> shared</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">SE.DS. TMCore.SQL </TypeId>< Height xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">100< /Height><L eft xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">569</Le ft><Stroke DashArray i:nil="tru e" xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts "/><Stroke Thickness xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">1 </StrokeTh ickness><T op xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">249</Top ><Width xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">100 </Width></ a:Value></ a:KeyValue OfguidanyT ype><a:Key ValueOfgui danyType>< a:Key>577b ec78-2ceb- 4b5f-81d8- fdf92cda3a 2e</a:Key> <a:Value z :Id="i8" i :type="Ste ncilRectan gle"><Gene ricTypeId xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">G E.EI</Gene ricTypeId> <Guid xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">577be c78-2ceb-4 b5f-81d8-f df92cda3a2 e</Guid><P roperties xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Ge neric Exte rnal Inter actor</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Name</ b:DisplayN ame><b:Nam e/><b:Valu e i:type=" c:string" xmlns:c="h ttp://www. w3.org/200 1/XMLSchem a">VistA ( Claims Ins tance)</b: Value></a: anyType><a :anyType i :type="b:B ooleanDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Ou t Of Scope </b:Displa yName><b:N ame>71f3d9 aa-b8ef-4e 54-8126-60 7a1d903103 </b:Name>< b:Value i: type="c:bo olean" xml ns:c="http ://www.w3. org/2001/X MLSchema"> false</b:V alue></a:a nyType><a: anyType i: type="b:St ringDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Reas on For Out Of Scope< /b:Display Name><b:Na me>752473b 6-52d4-477 6-9a24-202 153f7d579< /b:Name><b :Value i:t ype="c:str ing" xmlns :c="http:/ /www.w3.or g/2001/XML Schema"/>< /a:anyType ><a:anyTyp e i:type=" b:HeaderDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Configurab le Attribu tes</b:Dis playName>< b:Name/><b :Value i:n il="true"/ ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Authentica tes Itself </b:Displa yName><b:N ame>authen ticatesIts elf</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>Not Applicable </a:string ><a:string >No</a:str ing><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Lis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Type</b :DisplayNa me><b:Name >type</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No t Selected </a:string ><a:string >Code</a:s tring><a:s tring>Huma n</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Mic rosoft</b: DisplayNam e><b:Name> MS</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>No</a :string><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> </Properti es><TypeId xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> GE.EI</Typ eId><Heigh t xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >100</Heig ht><Left x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">60 8</Left><S trokeDashA rray i:nil ="true" xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts"/><S trokeThick ness xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">1</Str okeThickne ss><Top xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">464 </Top><Wid th xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">100</Wid th></a:Val ue></a:Key ValueOfgui danyType>< a:KeyValue OfguidanyT ype><a:Key >ed286938- 5745-4258- 87cb-a51b2 399d0da</a :Key><a:Va lue z:Id=" i9" i:type ="StencilR ectangle"> <GenericTy peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.A</ GenericTyp eId><Guid xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">e d286938-57 45-4258-87 cb-a51b239 9d0da</Gui d><Propert ies xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s"><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Free Tex t Annotati on</b:Disp layName><b :Name/><b: Value i:ni l="true"/> </a:anyTyp e><a:anyTy pe i:type= "b:StringD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Name</b:D isplayName ><b:Name/> <b:Value i :type="c:s tring" xml ns:c="http ://www.w3. org/2001/X MLSchema"> The WebVRA M browser takes the json respo nse and th en instant iates (usi ng JavaScr ipt) Micro soft’s b uilt in ob ject linki ng and emb edding (co mmonly ref erred to O LE and com ically pro nounced †œohh-layyy â€). We p ass the js on respons e to OLE a s argument s and inst ruct OLE t o launch R eflections with the arguments. Reflectio ns will th en read th e argument s and know how to co nnect to t he remote VistA over ssh and a uthenticat e to VistA using the one-time use token< /b:Value>< /a:anyType ><a:anyTyp e i:type=" b:BooleanD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Out Of Sc ope</b:Dis playName>< b:Name>71f 3d9aa-b8ef -4e54-8126 -607a1d903 103</b:Nam e><b:Value i:type="c :boolean" xmlns:c="h ttp://www. w3.org/200 1/XMLSchem a">false</ b:Value></ a:anyType> <a:anyType i:type="b :StringDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>R eason For Out Of Sco pe</b:Disp layName><b :Name>7524 73b6-52d4- 4776-9a24- 202153f7d5 79</b:Name ><b:Value i:type="c: string" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" /></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.A</ TypeId><He ight xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">470</H eight><Lef t xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >33</Left> <StrokeDas hArray i:n il="true" xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts"/> <StrokeThi ckness xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">1</S trokeThick ness><Top xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">3 29</Top><W idth xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">261</W idth></a:V alue></a:K eyValueOfg uidanyType ><a:KeyVal ueOfguidan yType><a:K ey>5708e72 c-bc8e-491 8-bb31-138 5fe0a1470< /a:Key><a: Value z:Id ="i10" i:t ype="Stenc ilRectangl e"><Generi cTypeId xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">GE. A</Generic TypeId><Gu id xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">5708e72c -bc8e-4918 -bb31-1385 fe0a1470</ Guid><Prop erties xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts"><a:a nyType i:t ype="b:Hea derDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Free Text Annot ation</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Name</ b:DisplayN ame><b:Nam e/><b:Valu e i:type=" c:string" xmlns:c="h ttp://www. w3.org/200 1/XMLSchem a">JSON OL E Argument s data flo w is throu gh the bro wser but i s depicted directly for clarit y</b:Value ></a:anyTy pe><a:anyT ype i:type ="b:Boolea nDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Out Of Scope</b:D isplayName ><b:Name>7 1f3d9aa-b8 ef-4e54-81 26-607a1d9 03103</b:N ame><b:Val ue i:type= "c:boolean " xmlns:c= "http://ww w.w3.org/2 001/XMLSch ema">false </b:Value> </a:anyTyp e><a:anyTy pe i:type= "b:StringD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Reason Fo r Out Of S cope</b:Di splayName> <b:Name>75 2473b6-52d 4-4776-9a2 4-202153f7 d579</b:Na me><b:Valu e i:type=" c:string" xmlns:c="h ttp://www. w3.org/200 1/XMLSchem a"/></a:an yType></Pr operties>< TypeId xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">GE.A </TypeId>< Height xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">100< /Height><L eft xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">228</Le ft><Stroke DashArray i:nil="tru e" xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts "/><Stroke Thickness xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">1 </StrokeTh ickness><T op xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">346</Top ><Width xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">160 </Width></ a:Value></ a:KeyValue OfguidanyT ype><a:Key ValueOfgui danyType>< a:Key>64c0 fab5-e329- 4856-b83e- fdd0589d55 5d</a:Key> <a:Value z :Id="i11" i:type="St encilRecta ngle"><Gen ericTypeId xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> GE.A</Gene ricTypeId> <Guid xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">64c0f ab5-e329-4 856-b83e-f dd0589d555 d</Guid><P roperties xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Fr ee Text An notation</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Nam e</b:Displ ayName><b: Name/><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema">The database p rimarily s upports th e ISO need s and is u sed to sto re audit l ogs that c apture the details ( no passwor d storage) of a user connectin g to a rem ote VistA system. </ b:Value></ a:anyType> <a:anyType i:type="b :BooleanDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Out Of Sco pe</b:Disp layName><b :Name>71f3 d9aa-b8ef- 4e54-8126- 607a1d9031 03</b:Name ><b:Value i:type="c: boolean" x mlns:c="ht tp://www.w 3.org/2001 /XMLSchema ">false</b :Value></a :anyType>< a:anyType i:type="b: StringDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Re ason For O ut Of Scop e</b:Displ ayName><b: Name>75247 3b6-52d4-4 776-9a24-2 02153f7d57 9</b:Name> <b:Value i :type="c:s tring" xml ns:c="http ://www.w3. org/2001/X MLSchema"/ ></a:anyTy pe></Prope rties><Typ eId xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">GE.A</T ypeId><Hei ght xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">101</He ight><Left xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 675</Left> <StrokeDas hArray i:n il="true" xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts"/> <StrokeThi ckness xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">1</S trokeThick ness><Top xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">2 48</Top><W idth xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">217</W idth></a:V alue></a:K eyValueOfg uidanyType ><a:KeyVal ueOfguidan yType><a:K ey>d718832 f-ad7b-4c2 9-85ae-bd3 9166f1dff< /a:Key><a: Value z:Id ="i12" i:t ype="Stenc ilRectangl e"><Generi cTypeId xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">GE. A</Generic TypeId><Gu id xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">d718832f -ad7b-4c29 -85ae-bd39 166f1dff</ Guid><Prop erties xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts"><a:a nyType i:t ype="b:Hea derDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Free Text Annot ation</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Name</ b:DisplayN ame><b:Nam e/><b:Valu e i:type=" c:string" xmlns:c="h ttp://www. w3.org/200 1/XMLSchem a">1) remo te VistA s ite domain name, 2) remote Vis tA ssh use rname and 3) a VistA one-time use token< /b:Value>< /a:anyType ><a:anyTyp e i:type=" b:BooleanD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Out Of Sc ope</b:Dis playName>< b:Name>71f 3d9aa-b8ef -4e54-8126 -607a1d903 103</b:Nam e><b:Value i:type="c :boolean" xmlns:c="h ttp://www. w3.org/200 1/XMLSchem a">false</ b:Value></ a:anyType> <a:anyType i:type="b :StringDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>R eason For Out Of Sco pe</b:Disp layName><b :Name>7524 73b6-52d4- 4776-9a24- 202153f7d5 79</b:Name ><b:Value i:type="c: string" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" /></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.A</ TypeId><He ight xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">154</H eight><Lef t xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >367</Left ><StrokeDa shArray i: nil="true" xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"/ ><StrokeTh ickness xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">1</ StrokeThic kness><Top xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 446</Top>< Width xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">172</ Width></a: Value></a: KeyValueOf guidanyTyp e><a:KeyVa lueOfguida nyType><a: Key>96cdd4 80-2f37-4b 29-8d7d-a8 01a6ed7a4f </a:Key><a :Value z:I d="i13" i: type="Sten cilRectang le"><Gener icTypeId x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">GE .A</Generi cTypeId><G uid xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">96cdd48 0-2f37-4b2 9-8d7d-a80 1a6ed7a4f< /Guid><Pro perties xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts"><a: anyType i: type="b:He aderDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Free Text Anno tation</b: DisplayNam e><b:Name/ ><b:Value i:nil="tru e"/></a:an yType><a:a nyType i:t ype="b:Str ingDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Name< /b:Display Name><b:Na me/><b:Val ue i:type= "c:string" xmlns:c=" http://www .w3.org/20 01/XMLSche ma">Vista RPC commun ication</b :Value></a :anyType>< a:anyType i:type="b: BooleanDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>O ut Of Scop e</b:Displ ayName><b: Name>71f3d 9aa-b8ef-4 e54-8126-6 07a1d90310 3</b:Name> <b:Value i :type="c:b oolean" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" >false</b: Value></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Rea son For Ou t Of Scope </b:Displa yName><b:N ame>752473 b6-52d4-47 76-9a24-20 2153f7d579 </b:Name>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema"/> </a:anyTyp e></Proper ties><Type Id xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">GE.A</Ty peId><Heig ht xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">100</Hei ght><Left xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">4 56</Left>< StrokeDash Array i:ni l="true" x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts"/>< StrokeThic kness xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">1</St rokeThickn ess><Top x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">37 3</Top><Wi dth xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">129</Wi dth></a:Va lue></a:Ke yValueOfgu idanyType> <a:KeyValu eOfguidany Type><a:Ke y>639a545b -8845-4f0e -aab1-2573 40da3be2</ a:Key><a:V alue z:Id= "i14" i:ty pe="Stenci lRectangle "><Generic TypeId xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">GE.A </GenericT ypeId><Gui d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >639a545b- 8845-4f0e- aab1-25734 0da3be2</G uid><Prope rties xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts"><a:an yType i:ty pe="b:Head erDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Free T ext Annota tion</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:Strin gDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Name</b :DisplayNa me><b:Name /><b:Value i:type="c :string" x mlns:c="ht tp://www.w 3.org/2001 /XMLSchema ">WebVRAM is a web a pplication that allo ws a Claim 's VistA u ser to acc ess author ized Remot e VistA sy stems.</b: Value></a: anyType><a :anyType i :type="b:B ooleanDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Ou t Of Scope </b:Displa yName><b:N ame>71f3d9 aa-b8ef-4e 54-8126-60 7a1d903103 </b:Name>< b:Value i: type="c:bo olean" xml ns:c="http ://www.w3. org/2001/X MLSchema"> false</b:V alue></a:a nyType><a: anyType i: type="b:St ringDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Reas on For Out Of Scope< /b:Display Name><b:Na me>752473b 6-52d4-477 6-9a24-202 153f7d579< /b:Name><b :Value i:t ype="c:str ing" xmlns :c="http:/ /www.w3.or g/2001/XML Schema"/>< /a:anyType ></Propert ies><TypeI d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >GE.A</Typ eId><Heigh t xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >100</Heig ht><Left x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">18 4</Left><S trokeDashA rray i:nil ="true" xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts"/><S trokeThick ness xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">1</Str okeThickne ss><Top xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">73< /Top><Widt h xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >358</Widt h></a:Valu e></a:KeyV alueOfguid anyType></ Borders><H eader>Samp le</Header ><Lines xm lns:a="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><a:K eyValueOfg uidanyType ><a:Key>6d 6efdb7-d7f 7-46d7-a4a c-16004f70 edde</a:Ke y><a:Value z:Id="i15 " i:type=" Connector" ><GenericT ypeId xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">GE.DF </GenericT ypeId><Gui d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >6d6efdb7- d7f7-46d7- a4ac-16004 f70edde</G uid><Prope rties xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts"><a:an yType i:ty pe="b:Head erDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Generi c Data Flo w</b:Displ ayName><b: Name/><b:V alue i:nil ="true"/>< /a:anyType ><a:anyTyp e i:type=" b:StringDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Name</b:Di splayName> <b:Name/>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema">Q uery VistA Connectio n Events</ b:Value></ a:anyType> <a:anyType i:type="b :BooleanDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Out Of Sco pe</b:Disp layName><b :Name>71f3 d9aa-b8ef- 4e54-8126- 607a1d9031 03</b:Name ><b:Value i:type="c: boolean" x mlns:c="ht tp://www.w 3.org/2001 /XMLSchema ">false</b :Value></a :anyType>< a:anyType i:type="b: StringDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Re ason For O ut Of Scop e</b:Displ ayName><b: Name>75247 3b6-52d4-4 776-9a24-2 02153f7d57 9</b:Name> <b:Value i :type="c:s tring" xml ns:c="http ://www.w3. org/2001/X MLSchema"/ ></a:anyTy pe><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Configur able Attri butes</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:List DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Physical Network</ b:DisplayN ame><b:Nam e>channel< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>Not Sele cted</a:st ring><a:st ring>Wire< /a:string> <a:string> Wi-Fi</a:s tring><a:s tring>Blue tooth</a:s tring><a:s tring>2G-4 G</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Sou rce Authen ticated</b :DisplayNa me><b:Name >authentic atesSource </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>Not Sel ected</a:s tring><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>De stination Authentica ted</b:Dis playName>< b:Name>aut henticates Destinatio n</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Prov ides Confi dentiality </b:Displa yName><b:N ame>provid esConfiden tiality</b :Name><b:V alue i:typ e="a:Array Ofstring"> <a:string> No</a:stri ng><a:stri ng>Yes</a: string></b :Value><b: SelectedIn dex>0</b:S electedInd ex></a:any Type><a:an yType i:ty pe="b:List DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Provides Integrity </b:Displa yName><b:N ame>provid esIntegrit y</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Tran smits XML< /b:Display Name><b:Na me>XMLenc< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Contai ns Cookies </b:Displa yName><b:N ame>Cookie s</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Yes</a :string><a :string>No </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>SOAP Payload</ b:DisplayN ame><b:Nam e>SOAP</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >REST Payl oad</b:Dis playName>< b:Name>RES T</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>RSS Payload</b :DisplayNa me><b:Name >RSS</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>No< /a:string> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >0</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>J SON Payloa d</b:Displ ayName><b: Name>JSON< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Forger y Protecti on</b:Disp layName><b :Name>5485 1a3b-65da- 4902-b4e0- 94ef015be7 35</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Not S elected</a :string><a :string>Va lidateAnti ForgeryTok enAttribut e</a:strin g><a:strin g>ViewStat eUserKey</ a:string>< a:string>N once</a:st ring><a:st ring>Other dynamic c anary</a:s tring><a:s tring>Stat ic header not availa ble to the browser</ a:string>< a:string>O ther</a:st ring><a:st ring>None< /a:string> <a:string> Not applic able becau se the req uest does not change data</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.DF< /TypeId><H andleX xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">508< /HandleX>< HandleY xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">221 </HandleY> <PortSourc e xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >East</Por tSource><P ortTarget xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">N orthWest</ PortTarget ><SourceGu id xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ SourceGuid ><SourceX xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">4 44</Source X><SourceY xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 303</Sourc eY><Target Guid xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">67d570 81-a947-43 01-b3b2-9d 4d633203cb </TargetGu id><Target X xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >574</Targ etX><Targe tY xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">254</Tar getY></a:V alue></a:K eyValueOfg uidanyType ><a:KeyVal ueOfguidan yType><a:K ey>93682b9 6-1f6d-4b1 0-8468-a03 79e5eb72d< /a:Key><a: Value z:Id ="i16" i:t ype="Conne ctor"><Gen ericTypeId xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> GE.DF</Gen ericTypeId ><Guid xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">9368 2b96-1f6d- 4b10-8468- a0379e5eb7 2d</Guid>< Properties xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> <a:anyType i:type="b :HeaderDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>G eneric Dat a Flow</b: DisplayNam e><b:Name/ ><b:Value i:nil="tru e"/></a:an yType><a:a nyType i:t ype="b:Str ingDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Name< /b:Display Name><b:Na me/><b:Val ue i:type= "c:string" xmlns:c=" http://www .w3.org/20 01/XMLSche ma">VistA Connection Events</b :Value></a :anyType>< a:anyType i:type="b: BooleanDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>O ut Of Scop e</b:Displ ayName><b: Name>71f3d 9aa-b8ef-4 e54-8126-6 07a1d90310 3</b:Name> <b:Value i :type="c:b oolean" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" >false</b: Value></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Rea son For Ou t Of Scope </b:Displa yName><b:N ame>752473 b6-52d4-47 76-9a24-20 2153f7d579 </b:Name>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema"/> </a:anyTyp e><a:anyTy pe i:type= "b:HeaderD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Configura ble Attrib utes</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Physical Network</b :DisplayNa me><b:Name >channel</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Selec ted</a:str ing><a:str ing>Wire</ a:string>< a:string>W i-Fi</a:st ring><a:st ring>Bluet ooth</a:st ring><a:st ring>2G-4G </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Sour ce Authent icated</b: DisplayNam e><b:Name> authentica tesSource< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>Not Sele cted</a:st ring><a:st ring>No</a :string><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Des tination A uthenticat ed</b:Disp layName><b :Name>auth enticatesD estination </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Provi des Confid entiality< /b:Display Name><b:Na me>provide sConfident iality</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Provides Integrity< /b:Display Name><b:Na me>provide sIntegrity </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Trans mits XML</ b:DisplayN ame><b:Nam e>XMLenc</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >No</a:str ing><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Lis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Contain s Cookies< /b:Display Name><b:Na me>Cookies </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>Yes</a: string><a: string>No< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>SOAP Payload</b :DisplayNa me><b:Name >SOAP</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No </a:string ><a:string >Yes</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> REST Paylo ad</b:Disp layName><b :Name>REST </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>RSS P ayload</b: DisplayNam e><b:Name> RSS</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>JS ON Payload </b:Displa yName><b:N ame>JSON</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >No</a:str ing><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Lis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Forgery Protectio n</b:Displ ayName><b: Name>54851 a3b-65da-4 902-b4e0-9 4ef015be73 5</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Not Se lected</a: string><a: string>Val idateAntiF orgeryToke nAttribute </a:string ><a:string >ViewState UserKey</a :string><a :string>No nce</a:str ing><a:str ing>Other dynamic ca nary</a:st ring><a:st ring>Stati c header n ot availab le to the browser</a :string><a :string>Ot her</a:str ing><a:str ing>None</ a:string>< a:string>N ot applica ble becaus e the requ est does n ot change data</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe></Prope rties><Typ eId xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">GE.DF</ TypeId><Ha ndleX xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">510</ HandleX><H andleY xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">245< /HandleY>< PortSource xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> West</Port Source><Po rtTarget x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">Ea st</PortTa rget><Sour ceGuid xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">67d5 7081-a947- 4301-b3b2- 9d4d633203 cb</Source Guid><Sour ceX xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">574</So urceX><Sou rceY xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">299</S ourceY><Ta rgetGuid x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</Targ etGuid><Ta rgetX xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">444</ TargetX><T argetY xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">303< /TargetY>< /a:Value>< /a:KeyValu eOfguidany Type><a:Ke yValueOfgu idanyType> <a:Key>cfe dae71-be4b -4234-9a5b -aa018f5dd 6d9</a:Key ><a:Value z:Id="i17" i:type="C onnector"> <GenericTy peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.DF< /GenericTy peId><Guid xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> cfedae71-b e4b-4234-9 a5b-aa018f 5dd6d9</Gu id><Proper ties xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts"><a:any Type i:typ e="b:Heade rDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>HTTPS</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Nam e</b:Displ ayName><b: Name/><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema">Requ ests</b:Va lue></a:an yType><a:a nyType i:t ype="b:Boo leanDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Out Of Scope</ b:DisplayN ame><b:Nam e>71f3d9aa -b8ef-4e54 -8126-607a 1d903103</ b:Name><b: Value i:ty pe="c:bool ean" xmlns :c="http:/ /www.w3.or g/2001/XML Schema">fa lse</b:Val ue></a:any Type><a:an yType i:ty pe="b:Stri ngDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Reason For Out O f Scope</b :DisplayNa me><b:Name >752473b6- 52d4-4776- 9a24-20215 3f7d579</b :Name><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema"/></a :anyType>< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Pr edefined S tatic Attr ibutes</b: DisplayNam e><b:Name/ ><b:Value i:nil="tru e"/></a:an yType><a:a nyType i:t ype="b:Sta ticListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>D estination Authentic ated</b:Di splayName> <b:Name>au thenticate sDestinati on</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:St aticListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Provides C onfidentia lity</b:Di splayName> <b:Name>pr ovidesConf identialit y</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Sta ticListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>P rovides In tegrity</b :DisplayNa me><b:Name >providesI ntegrity</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Yes</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Configur able Attri butes</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:Head erDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>As Gen eric Data Flow</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Physical Network</b :DisplayNa me><b:Name >channel</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Selec ted</a:str ing><a:str ing>Wire</ a:string>< a:string>W i-Fi</a:st ring><a:st ring>Bluet ooth</a:st ring><a:st ring>2G-4G </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Sour ce Authent icated</b: DisplayNam e><b:Name> authentica tesSource< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>Not Sele cted</a:st ring><a:st ring>No</a :string><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Tra nsmits XML </b:Displa yName><b:N ame>XMLenc </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Conta ins Cookie s</b:Displ ayName><b: Name>Cooki es</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Yes</ a:string>< a:string>N o</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>SOA P Payload< /b:Display Name><b:Na me>SOAP</b :Name><b:V alue i:typ e="a:Array Ofstring"> <a:string> No</a:stri ng><a:stri ng>Yes</a: string></b :Value><b: SelectedIn dex>0</b:S electedInd ex></a:any Type><a:an yType i:ty pe="b:List DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>REST Pay load</b:Di splayName> <b:Name>RE ST</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>No</a :string><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>RSS Payload</ b:DisplayN ame><b:Nam e>RSS</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No </a:string ><a:string >Yes</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> JSON Paylo ad</b:Disp layName><b :Name>JSON </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Forge ry Protect ion</b:Dis playName>< b:Name>548 51a3b-65da -4902-b4e0 -94ef015be 735</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>Not Selected</ a:string>< a:string>V alidateAnt iForgeryTo kenAttribu te</a:stri ng><a:stri ng>ViewSta teUserKey< /a:string> <a:string> Nonce</a:s tring><a:s tring>Othe r dynamic canary</a: string><a: string>Sta tic header not avail able to th e browser< /a:string> <a:string> Other</a:s tring><a:s tring>None </a:string ><a:string >Not appli cable beca use the re quest does not chang e data</a: string></b :Value><b: SelectedIn dex>0</b:S electedInd ex></a:any Type></Pro perties><T ypeId xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">SE.DF .TMCore.HT TPS</TypeI d><HandleX xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 286</Handl eX><Handle Y xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >237</Hand leY><PortS ource xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">East< /PortSourc e><PortTar get xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">NorthWe st</PortTa rget><Sour ceGuid xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">322b 3360-cf25- 454c-a328- a52ac3b88c 0a</Source Guid><Sour ceX xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">213</So urceX><Sou rceY xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">298</S ourceY><Ta rgetGuid x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</Targ etGuid><Ta rgetX xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">367</ TargetX><T argetY xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">271< /TargetY>< /a:Value>< /a:KeyValu eOfguidany Type><a:Ke yValueOfgu idanyType> <a:Key>575 120da-f6c6 -45d7-b62d -9f7e242ea a54</a:Key ><a:Value z:Id="i18" i:type="C onnector"> <GenericTy peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.DF< /GenericTy peId><Guid xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 575120da-f 6c6-45d7-b 62d-9f7e24 2eaa54</Gu id><Proper ties xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts"><a:any Type i:typ e="b:Heade rDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>HTTPS</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Nam e</b:Displ ayName><b: Name/><b:V alue i:typ e="c:strin g" xmlns:c ="http://w ww.w3.org/ 2001/XMLSc hema">Resu lts</b:Val ue></a:any Type><a:an yType i:ty pe="b:Bool eanDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Out O f Scope</b :DisplayNa me><b:Name >71f3d9aa- b8ef-4e54- 8126-607a1 d903103</b :Name><b:V alue i:typ e="c:boole an" xmlns: c="http:// www.w3.org /2001/XMLS chema">fal se</b:Valu e></a:anyT ype><a:any Type i:typ e="b:Strin gDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Reason For Out Of Scope</b: DisplayNam e><b:Name> 752473b6-5 2d4-4776-9 a24-202153 f7d579</b: Name><b:Va lue i:type ="c:string " xmlns:c= "http://ww w.w3.org/2 001/XMLSch ema"/></a: anyType><a :anyType i :type="b:H eaderDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Pre defined St atic Attri butes</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:Stat icListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>De stination Authentica ted</b:Dis playName>< b:Name>aut henticates Destinatio n</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Sta ticListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>P rovides Co nfidential ity</b:Dis playName>< b:Name>pro videsConfi dentiality </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>Yes</a: string></b :Value><b: SelectedIn dex>0</b:S electedInd ex></a:any Type><a:an yType i:ty pe="b:Stat icListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Pr ovides Int egrity</b: DisplayNam e><b:Name> providesIn tegrity</b :Name><b:V alue i:typ e="a:Array Ofstring"> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >0</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:HeaderD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Configura ble Attrib utes</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:Heade rDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>As Gene ric Data F low</b:Dis playName>< b:Name/><b :Value i:n il="true"/ ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Physical N etwork</b: DisplayNam e><b:Name> channel</b :Name><b:V alue i:typ e="a:Array Ofstring"> <a:string> Not Select ed</a:stri ng><a:stri ng>Wire</a :string><a :string>Wi -Fi</a:str ing><a:str ing>Blueto oth</a:str ing><a:str ing>2G-4G< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Sourc e Authenti cated</b:D isplayName ><b:Name>a uthenticat esSource</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Selec ted</a:str ing><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Tran smits XML< /b:Display Name><b:Na me>XMLenc< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Contai ns Cookies </b:Displa yName><b:N ame>Cookie s</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Yes</a :string><a :string>No </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>SOAP Payload</ b:DisplayN ame><b:Nam e>SOAP</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >REST Payl oad</b:Dis playName>< b:Name>RES T</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>RSS Payload</b :DisplayNa me><b:Name >RSS</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>No< /a:string> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >0</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>J SON Payloa d</b:Displ ayName><b: Name>JSON< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Forger y Protecti on</b:Disp layName><b :Name>5485 1a3b-65da- 4902-b4e0- 94ef015be7 35</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Not S elected</a :string><a :string>Va lidateAnti ForgeryTok enAttribut e</a:strin g><a:strin g>ViewStat eUserKey</ a:string>< a:string>N once</a:st ring><a:st ring>Other dynamic c anary</a:s tring><a:s tring>Stat ic header not availa ble to the browser</ a:string>< a:string>O ther</a:st ring><a:st ring>None< /a:string> <a:string> Not applic able becau se the req uest does not change data</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">SE.DF. TMCore.HTT PS</TypeId ><HandleX xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">2 89</Handle X><HandleY xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 260</Handl eY><PortSo urce xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">West</ PortSource ><PortTarg et xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">East</Po rtTarget>< SourceGuid xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</So urceGuid>< SourceX xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">354 </SourceX> <SourceY x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">30 3</SourceY ><TargetGu id xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">322b3360 -cf25-454c -a328-a52a c3b88c0a</ TargetGuid ><TargetX xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">2 13</Target X><TargetY xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 298</Targe tY></a:Val ue></a:Key ValueOfgui danyType>< a:KeyValue OfguidanyT ype><a:Key >506256b7- 0f0b-4407- 82cd-4f728 d1f6a4d</a :Key><a:Va lue z:Id=" i19" i:typ e="Connect or"><Gener icTypeId x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">GE .DF</Gener icTypeId>< Guid xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">506256 b7-0f0b-44 07-82cd-4f 728d1f6a4d </Guid><Pr operties x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts"><a :anyType i :type="b:H eaderDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>HTT PS</b:Disp layName><b :Name/><b: Value i:ni l="true"/> </a:anyTyp e><a:anyTy pe i:type= "b:StringD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Name</b:D isplayName ><b:Name/> <b:Value i :type="c:s tring" xml ns:c="http ://www.w3. org/2001/X MLSchema"> Claims-Pro vided Vist A user cre dentials</ b:Value></ a:anyType> <a:anyType i:type="b :BooleanDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Out Of Sco pe</b:Disp layName><b :Name>71f3 d9aa-b8ef- 4e54-8126- 607a1d9031 03</b:Name ><b:Value i:type="c: boolean" x mlns:c="ht tp://www.w 3.org/2001 /XMLSchema ">false</b :Value></a :anyType>< a:anyType i:type="b: StringDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Re ason For O ut Of Scop e</b:Displ ayName><b: Name>75247 3b6-52d4-4 776-9a24-2 02153f7d57 9</b:Name> <b:Value i :type="c:s tring" xml ns:c="http ://www.w3. org/2001/X MLSchema"/ ></a:anyTy pe><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Predefin ed Static Attributes </b:Displa yName><b:N ame/><b:Va lue i:nil= "true"/></ a:anyType> <a:anyType i:type="b :StaticLis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Destina tion Authe nticated</ b:DisplayN ame><b:Nam e>authenti catesDesti nation</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:StaticLi stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Provid es Confide ntiality</ b:DisplayN ame><b:Nam e>provides Confidenti ality</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :StaticLis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Provide s Integrit y</b:Displ ayName><b: Name>provi desIntegri ty</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:He aderDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Conf igurable A ttributes< /b:Display Name><b:Na me/><b:Val ue i:nil=" true"/></a :anyType>< a:anyType i:type="b: HeaderDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>As Generic D ata Flow</ b:DisplayN ame><b:Nam e/><b:Valu e i:nil="t rue"/></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Physi cal Networ k</b:Displ ayName><b: Name>chann el</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Not S elected</a :string><a :string>Wi re</a:stri ng><a:stri ng>Wi-Fi</ a:string>< a:string>B luetooth</ a:string>< a:string>2 G-4G</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Source Aut henticated </b:Displa yName><b:N ame>authen ticatesSou rce</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>Not Selected</ a:string>< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Transmits XML</b:Di splayName> <b:Name>XM Lenc</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>No< /a:string> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >0</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>C ontains Co okies</b:D isplayName ><b:Name>C ookies</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>Y es</a:stri ng><a:stri ng>No</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >SOAP Payl oad</b:Dis playName>< b:Name>SOA P</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>REST Payload</ b:DisplayN ame><b:Nam e>REST</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >RSS Paylo ad</b:Disp layName><b :Name>RSS< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>JSON P ayload</b: DisplayNam e><b:Name> JSON</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>No< /a:string> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >1</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>F orgery Pro tection</b :DisplayNa me><b:Name >54851a3b- 65da-4902- b4e0-94ef0 15be735</b :Name><b:V alue i:typ e="a:Array Ofstring"> <a:string> Not Select ed</a:stri ng><a:stri ng>Validat eAntiForge ryTokenAtt ribute</a: string><a: string>Vie wStateUser Key</a:str ing><a:str ing>Nonce< /a:string> <a:string> Other dyna mic canary </a:string ><a:string >Static he ader not a vailable t o the brow ser</a:str ing><a:str ing>Other< /a:string> <a:string> None</a:st ring><a:st ring>Not a pplicable because th e request does not c hange data </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< /Propertie s><TypeId xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">S E.DF.TMCor e.HTTPS</T ypeId><Han dleX xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">290</H andleX><Ha ndleY xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">323</ HandleY><P ortSource xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">S outhWest</ PortSource ><PortTarg et xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">NorthEas t</PortTar get><Sourc eGuid xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</SourceG uid><Sourc eX xmlns=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Model .Abstracts ">367</Sou rceX><Sour ceY xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">334</So urceY><Tar getGuid xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">5ae 6e1e4-d1d8 -4306-9e99 -8896c7977 524</Targe tGuid><Tar getX xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">216</T argetX><Ta rgetY xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">369</ TargetY></ a:Value></ a:KeyValue OfguidanyT ype><a:Key ValueOfgui danyType>< a:Key>62e9 d030-f66e- 488d-87d0- 588469f968 14</a:Key> <a:Value z :Id="i20" i:type="Co nnector">< GenericTyp eId xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">GE.DF</ GenericTyp eId><Guid xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">6 2e9d030-f6 6e-488d-87 d0-588469f 96814</Gui d><Propert ies xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s"><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Generic Data Flow< /b:Display Name><b:Na me/><b:Val ue i:nil=" true"/></a :anyType>< a:anyType i:type="b: StringDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Na me</b:Disp layName><b :Name/><b: Value i:ty pe="c:stri ng" xmlns: c="http:// www.w3.org /2001/XMLS chema">A/V codes to authentica te user </ b:Value></ a:anyType> <a:anyType i:type="b :BooleanDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Out Of Sco pe</b:Disp layName><b :Name>71f3 d9aa-b8ef- 4e54-8126- 607a1d9031 03</b:Name ><b:Value i:type="c: boolean" x mlns:c="ht tp://www.w 3.org/2001 /XMLSchema ">false</b :Value></a :anyType>< a:anyType i:type="b: StringDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>Re ason For O ut Of Scop e</b:Displ ayName><b: Name>75247 3b6-52d4-4 776-9a24-2 02153f7d57 9</b:Name> <b:Value i :type="c:s tring" xml ns:c="http ://www.w3. org/2001/X MLSchema"/ ></a:anyTy pe><a:anyT ype i:type ="b:Header DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Configur able Attri butes</b:D isplayName ><b:Name/> <b:Value i :nil="true "/></a:any Type><a:an yType i:ty pe="b:List DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Physical Network</ b:DisplayN ame><b:Nam e>channel< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>Not Sele cted</a:st ring><a:st ring>Wire< /a:string> <a:string> Wi-Fi</a:s tring><a:s tring>Blue tooth</a:s tring><a:s tring>2G-4 G</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Sou rce Authen ticated</b :DisplayNa me><b:Name >authentic atesSource </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>Not Sel ected</a:s tring><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>De stination Authentica ted</b:Dis playName>< b:Name>aut henticates Destinatio n</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Prov ides Confi dentiality </b:Displa yName><b:N ame>provid esConfiden tiality</b :Name><b:V alue i:typ e="a:Array Ofstring"> <a:string> No</a:stri ng><a:stri ng>Yes</a: string></b :Value><b: SelectedIn dex>0</b:S electedInd ex></a:any Type><a:an yType i:ty pe="b:List DisplayAtt ribute" xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: DisplayNam e>Provides Integrity </b:Displa yName><b:N ame>provid esIntegrit y</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Tran smits XML< /b:Display Name><b:Na me>XMLenc< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Contai ns Cookies </b:Displa yName><b:N ame>Cookie s</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Yes</a :string><a :string>No </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>SOAP Payload</ b:DisplayN ame><b:Nam e>SOAP</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >REST Payl oad</b:Dis playName>< b:Name>RES T</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>No</a: string><a: string>Yes </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>RSS Payload</b :DisplayNa me><b:Name >RSS</b:Na me><b:Valu e i:type=" a:ArrayOfs tring"><a: string>No< /a:string> <a:string> Yes</a:str ing></b:Va lue><b:Sel ectedIndex >0</b:Sele ctedIndex> </a:anyTyp e><a:anyTy pe i:type= "b:ListDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>J SON Payloa d</b:Displ ayName><b: Name>JSON< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>No</a:st ring><a:st ring>Yes</ a:string>< /b:Value>< b:Selected Index>0</b :SelectedI ndex></a:a nyType><a: anyType i: type="b:Li stDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Forger y Protecti on</b:Disp layName><b :Name>5485 1a3b-65da- 4902-b4e0- 94ef015be7 35</b:Name ><b:Value i:type="a: ArrayOfstr ing"><a:st ring>Not S elected</a :string><a :string>Va lidateAnti ForgeryTok enAttribut e</a:strin g><a:strin g>ViewStat eUserKey</ a:string>< a:string>N once</a:st ring><a:st ring>Other dynamic c anary</a:s tring><a:s tring>Stat ic header not availa ble to the browser</ a:string>< a:string>O ther</a:st ring><a:st ring>None< /a:string> <a:string> Not applic able becau se the req uest does not change data</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype></Prop erties><Ty peId xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">GE.DF< /TypeId><H andleX xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">565< /HandleX>< HandleY xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">365 </HandleY> <PortSourc e xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >SouthEast </PortSour ce><PortTa rget xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">NorthW est</PortT arget><Sou rceGuid xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</Sourc eGuid><Sou rceX xmlns ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Mod el.Abstrac ts">430</S ourceX><So urceY xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">334</ SourceY><T argetGuid xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">5 77bec78-2c eb-4b5f-81 d8-fdf92cd a3a2e</Tar getGuid><T argetX xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">613< /TargetX>< TargetY xm lns="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Model.Abst racts">469 </TargetY> </a:Value> </a:KeyVal ueOfguidan yType><a:K eyValueOfg uidanyType ><a:Key>03 66cea8-727 9-405c-94e 0-371fe09d 9992</a:Ke y><a:Value z:Id="i21 " i:type=" Connector" ><GenericT ypeId xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">GE.DF </GenericT ypeId><Gui d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >0366cea8- 7279-405c- 94e0-371fe 09d9992</G uid><Prope rties xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts"><a:an yType i:ty pe="b:Head erDisplayA ttribute" xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:DisplayN ame>Generi c Data Flo w</b:Displ ayName><b: Name/><b:V alue i:nil ="true"/>< /a:anyType ><a:anyTyp e i:type=" b:StringDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> Name</b:Di splayName> <b:Name/>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema">C laims-Prov ided VistA user cred entials</b :Value></a :anyType>< a:anyType i:type="b: BooleanDis playAttrib ute" xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Dis playName>O ut Of Scop e</b:Displ ayName><b: Name>71f3d 9aa-b8ef-4 e54-8126-6 07a1d90310 3</b:Name> <b:Value i :type="c:b oolean" xm lns:c="htt p://www.w3 .org/2001/ XMLSchema" >false</b: Value></a: anyType><a :anyType i :type="b:S tringDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Rea son For Ou t Of Scope </b:Displa yName><b:N ame>752473 b6-52d4-47 76-9a24-20 2153f7d579 </b:Name>< b:Value i: type="c:st ring" xmln s:c="http: //www.w3.o rg/2001/XM LSchema"/> </a:anyTyp e><a:anyTy pe i:type= "b:HeaderD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Configura ble Attrib utes</b:Di splayName> <b:Name/>< b:Value i: nil="true" /></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Physical Network</b :DisplayNa me><b:Name >channel</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >Not Selec ted</a:str ing><a:str ing>Wire</ a:string>< a:string>W i-Fi</a:st ring><a:st ring>Bluet ooth</a:st ring><a:st ring>2G-4G </a:string ></b:Value ><b:Select edIndex>0< /b:Selecte dIndex></a :anyType>< a:anyType i:type="b: ListDispla yAttribute " xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Displa yName>Sour ce Authent icated</b: DisplayNam e><b:Name> authentica tesSource< /b:Name><b :Value i:t ype="a:Arr ayOfstring "><a:strin g>Not Sele cted</a:st ring><a:st ring>No</a :string><a :string>Ye s</a:strin g></b:Valu e><b:Selec tedIndex>0 </b:Select edIndex></ a:anyType> <a:anyType i:type="b :ListDispl ayAttribut e" xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Displ ayName>Des tination A uthenticat ed</b:Disp layName><b :Name>auth enticatesD estination </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Provi des Confid entiality< /b:Display Name><b:Na me>provide sConfident iality</b: Name><b:Va lue i:type ="a:ArrayO fstring">< a:string>N o</a:strin g><a:strin g>Yes</a:s tring></b: Value><b:S electedInd ex>0</b:Se lectedInde x></a:anyT ype><a:any Type i:typ e="b:ListD isplayAttr ibute" xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:D isplayName >Provides Integrity< /b:Display Name><b:Na me>provide sIntegrity </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>Trans mits XML</ b:DisplayN ame><b:Nam e>XMLenc</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >No</a:str ing><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Lis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Contain s Cookies< /b:Display Name><b:Na me>Cookies </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>Yes</a: string><a: string>No< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>SOAP Payload</b :DisplayNa me><b:Name >SOAP</b:N ame><b:Val ue i:type= "a:ArrayOf string"><a :string>No </a:string ><a:string >Yes</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe><a:anyT ype i:type ="b:ListDi splayAttri bute" xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Di splayName> REST Paylo ad</b:Disp layName><b :Name>REST </b:Name>< b:Value i: type="a:Ar rayOfstrin g"><a:stri ng>No</a:s tring><a:s tring>Yes< /a:string> </b:Value> <b:Selecte dIndex>0</ b:Selected Index></a: anyType><a :anyType i :type="b:L istDisplay Attribute" xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Display Name>RSS P ayload</b: DisplayNam e><b:Name> RSS</b:Nam e><b:Value i:type="a :ArrayOfst ring"><a:s tring>No</ a:string>< a:string>Y es</a:stri ng></b:Val ue><b:Sele ctedIndex> 0</b:Selec tedIndex>< /a:anyType ><a:anyTyp e i:type=" b:ListDisp layAttribu te" xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Disp layName>JS ON Payload </b:Displa yName><b:N ame>JSON</ b:Name><b: Value i:ty pe="a:Arra yOfstring" ><a:string >No</a:str ing><a:str ing>Yes</a :string></ b:Value><b :SelectedI ndex>0</b: SelectedIn dex></a:an yType><a:a nyType i:t ype="b:Lis tDisplayAt tribute" x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :DisplayNa me>Forgery Protectio n</b:Displ ayName><b: Name>54851 a3b-65da-4 902-b4e0-9 4ef015be73 5</b:Name> <b:Value i :type="a:A rrayOfstri ng"><a:str ing>Not Se lected</a: string><a: string>Val idateAntiF orgeryToke nAttribute </a:string ><a:string >ViewState UserKey</a :string><a :string>No nce</a:str ing><a:str ing>Other dynamic ca nary</a:st ring><a:st ring>Stati c header n ot availab le to the browser</a :string><a :string>Ot her</a:str ing><a:str ing>None</ a:string>< a:string>N ot applica ble becaus e the requ est does n ot change data</a:st ring></b:V alue><b:Se lectedInde x>0</b:Sel ectedIndex ></a:anyTy pe></Prope rties><Typ eId xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">GE.DF</ TypeId><Ha ndleX xmln s="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Mo del.Abstra cts">460</ HandleX><H andleY xml ns="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.M odel.Abstr acts">442< /HandleY>< PortSource xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> West</Port Source><Po rtTarget x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">So uthEast</P ortTarget> <SourceGui d xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e</S ourceGuid> <SourceX x mlns="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Model.Abs tracts">61 3</SourceX ><SourceY xmlns="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Model.Ab stracts">5 14</Source Y><TargetG uid xmlns= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Mode l.Abstract s">d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /TargetGui d><TargetX xmlns="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Model.A bstracts"> 430</Targe tX><Target Y xmlns="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Model. Abstracts" >334</Targ etY></a:Va lue></a:Ke yValueOfgu idanyType> </Lines><Z oom>0.75</ Zoom></Dra wingSurfac eModel></D rawingSurf aceList><M etaInforma tion><Assu mptions/>< Contributo rs/><Exter nalDepende ncies/><Hi ghLevelSys temDescrip tion/><Own er/><Revie wer/><Thre atModelNam e/></MetaI nformation ><Notes/>< ThreatInst ances xmln s:a="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:Key>E76 7d57081-a9 47-4301-b3 b2-9d4d633 203cb93682 b96-1f6d-4 b10-8468-a 0379e5eb72 dd7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</a :Key><a:Va lue xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Chan gedBy i:ni l="true"/> <b:Drawing SurfaceGui d>2307879a -6671-439b -a5af-9957 1be4ea24</ b:DrawingS urfaceGuid ><b:FlowGu id>93682b9 6-1f6d-4b1 0-8468-a03 79e5eb72d< /b:FlowGui d><b:Id>50 </b:Id><b: Interactio nKey>67d57 081-a947-4 301-b3b2-9 d4d633203c b:93682b96 -1f6d-4b10 -8468-a037 9e5eb72d:d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:I nteraction Key><b:Int eractionSt ring i:nil ="true"/>< b:Modified At>0001-01 -01T00:00: 00</b:Modi fiedAt><b: Priority>H igh</b:Pri ority><b:P roperties> <a:KeyValu eOfstrings tring><a:K ey>Title</ a:Key><a:V alue>Eleva tion by Ch anging the Execution Flow in W ebVRAM</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatCate gory</a:Ke y><a:Value >Elevation Of Privil ege</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>A us er subject gains inc reased cap ability or privilege by taking advantage of an imp lementatio n bug.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatDesc ription</a :Key><a:Va lue>An att acker may pass data into WebVR AM in orde r to chang e the flow of progra m executio n within W ebVRAM to the attack er's choos ing.</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Intera ctionStrin g</a:Key>< a:Value>Vi stA Connec tion Event s</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Priority< /a:Key><a: Value>High </a:Value> </a:KeyVal ueOfstring string></b :Propertie s><b:Sourc eGuid>67d5 7081-a947- 4301-b3b2- 9d4d633203 cb</b:Sour ceGuid><b: State>Auto Generated< /b:State>< b:StateInf ormation i :nil="true "/><b:Targ etGuid>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</b:Tar getGuid><b :Title i:n il="true"/ ><b:TypeId >E7</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>S7.1d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f6d6ef db7-d7f7-4 6d7-a4ac-1 6004f70edd e67d57081- a947-4301- b3b2-9d4d6 33203cb</a :Key><a:Va lue xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Chan gedBy>VHA2 1\ DNS</b:Cha ngedBy><b: DrawingSur faceGuid>2 307879a-66 71-439b-a5 af-99571be 4ea24</b:D rawingSurf aceGuid><b :FlowGuid> 6d6efdb7-d 7f7-46d7-a 4ac-16004f 70edde</b: FlowGuid>< b:Id>1</b: Id><b:Inte ractionKey >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f:6d 6efdb7-d7f 7-46d7-a4a c-16004f70 edde:67d57 081-a947-4 301-b3b2-9 d4d633203c b</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>2 017-06-14T 07:10:49.4 776054-10: 00</b:Modi fiedAt><b: Priority>H igh</b:Pri ority><b:P roperties> <a:KeyValu eOfstrings tring><a:K ey>Title</ a:Key><a:V alue>Spoof ing of Des tination D ata Store SQL Databa se</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Spo ofing</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>Sp oofing is when a pro cess or en tity is so mething ot her than i ts claimed identity. Examples include su bstituting a process , a file, website or a network address.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Web VRAM Datab ase may be spoofed b y an attac ker and th is may lea d to data being writ ten to the attacker' s target i nstead of WebVRAM Da tabase. Co nsider usi ng a stand ard authen tication m echanism t o identify the desti nation dat a store.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>St ateInforma tion</a:Ke y><a:Value >SSL used to identif y destinat ion data s tore.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>Q uery VistA Connectio n Events</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Pr iority</a: Key><a:Val ue>High</a :Value></a :KeyValueO fstringstr ing></b:Pr operties>< b:SourceGu id>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:SourceG uid><b:Sta te>Mitigat ed</b:Stat e><b:State Informatio n i:nil="t rue"/><b:T argetGuid> 67d57081-a 947-4301-b 3b2-9d4d63 3203cb</b: TargetGuid ><b:Title i:nil="tru e"/><b:Typ eId>S7.1</ b:TypeId>< b:Upgraded >false</b: Upgraded>< b:UserThre atCategory i:nil="tr ue"/><b:Us erThreatDe scription i:nil="tru e"/><b:Use rThreatSho rtDescript ion i:nil= "true"/><b :Wide>fals e</b:Wide> </a:Value> </a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: KeyValueOf stringThre atpc_P0_Ph OB><a:Key> T7d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f6d 6efdb7-d7f 7-46d7-a4a c-16004f70 edde67d570 81-a947-43 01-b3b2-9d 4d633203cb </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>6d6e fdb7-d7f7- 46d7-a4ac- 16004f70ed de</b:Flow Guid><b:Id >2</b:Id>< b:Interact ionKey>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f:6d6efd b7-d7f7-46 d7-a4ac-16 004f70edde :67d57081- a947-4301- b3b2-9d4d6 33203cb</b :Interacti onKey><b:I nteraction String i:n il="true"/ ><b:Modifi edAt>0001- 01-01T00:0 0:00</b:Mo difiedAt>< b:Priority >High</b:P riority><b :Propertie s><a:KeyVa lueOfstrin gstring><a :Key>Title </a:Key><a :Value>Pot ential SQL Injection Vulnerabi lity for S QL Databas e</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Tamp ering</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>Ta mpering is the act o f altering the bits. Tampering with a pr ocess invo lves chang ing bits i n the runn ing proces s. Similar ly, Tamper ing with a data flow involves changing b its on the wire or b etween two running p rocesses.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>SQL injection is an att ack in whi ch malicio us code is inserted into strin gs that ar e later pa ssed to an instance of SQL Ser ver for pa rsing and execution. Any proce dure that constructs SQL state ments shou ld be revi ewed for i njection v ulnerabili ties becau se SQL Ser ver will e xecute all syntactic ally valid queries t hat it rec eives. Eve n paramete rized data can be ma nipulated by a skill ed and det ermined at tacker.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >Query Vis tA Connect ion Events </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Priority</ a:Key><a:V alue>High< /a:Value>< /a:KeyValu eOfstrings tring></b: Properties ><b:Source Guid>d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Sourc eGuid><b:S tate>AutoG enerated</ b:State><b :StateInfo rmation i: nil="true" /><b:Targe tGuid>67d5 7081-a947- 4301-b3b2- 9d4d633203 cb</b:Targ etGuid><b: Title i:ni l="true"/> <b:TypeId> T7</b:Type Id><b:Upgr aded>false </b:Upgrad ed><b:User ThreatCate gory i:nil ="true"/>< b:UserThre atDescript ion i:nil= "true"/><b :UserThrea tShortDesc ription i: nil="true" /><b:Wide> false</b:W ide></a:Va lue></a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: Key>E667d5 7081-a947- 4301-b3b2- 9d4d633203 cb93682b96 -1f6d-4b10 -8468-a037 9e5eb72dd7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</a:Ke y><a:Value xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Changed By i:nil=" true"/><b: DrawingSur faceGuid>2 307879a-66 71-439b-a5 af-99571be 4ea24</b:D rawingSurf aceGuid><b :FlowGuid> 93682b96-1 f6d-4b10-8 468-a0379e 5eb72d</b: FlowGuid>< b:Id>49</b :Id><b:Int eractionKe y>67d57081 -a947-4301 -b3b2-9d4d 633203cb:9 3682b96-1f 6d-4b10-84 68-a0379e5 eb72d:d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</b:Inte ractionKey ><b:Intera ctionStrin g i:nil="t rue"/><b:M odifiedAt> 0001-01-01 T00:00:00< /b:Modifie dAt><b:Pri ority>High </b:Priori ty><b:Prop erties><a: KeyValueOf stringstri ng><a:Key> Title</a:K ey><a:Valu e>WebVRAM May be Sub ject to El evation of Privilege Using Rem ote Code E xecution</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatCa tegory</a: Key><a:Val ue>Elevati on Of Priv ilege</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>A user subje ct gains i ncreased c apability or privile ge by taki ng advanta ge of an i mplementat ion bug.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatDe scription< /a:Key><a: Value>WebV RAM Databa se may be able to re motely exe cute code for WebVRA M.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Vist A Connecti on Events< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>67d570 81-a947-43 01-b3b2-9d 4d633203cb </b:Source Guid><b:St ate>AutoGe nerated</b :State><b: StateInfor mation i:n il="true"/ ><b:Target Guid>d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Targe tGuid><b:T itle i:nil ="true"/>< b:TypeId>E 6</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K ey>D567d57 081-a947-4 301-b3b2-9 d4d633203c b93682b96- 1f6d-4b10- 8468-a0379 e5eb72dd7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y i:nil="t rue"/><b:D rawingSurf aceGuid>23 07879a-667 1-439b-a5a f-99571be4 ea24</b:Dr awingSurfa ceGuid><b: FlowGuid>9 3682b96-1f 6d-4b10-84 68-a0379e5 eb72d</b:F lowGuid><b :Id>48</b: Id><b:Inte ractionKey >67d57081- a947-4301- b3b2-9d4d6 33203cb:93 682b96-1f6 d-4b10-846 8-a0379e5e b72d:d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>0 001-01-01T 00:00:00</ b:Modified At><b:Prio rity>High< /b:Priorit y><b:Prope rties><a:K eyValueOfs tringstrin g><a:Key>T itle</a:Ke y><a:Value >Data Stor e Inaccess ible</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatCatego ry</a:Key> <a:Value>D enial Of S ervice</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatShor tDescripti on</a:Key> <a:Value>D enial of S ervice hap pens when the proces s or a dat astore is not able t o service incoming r equests or perform u p to spec. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Descriptio n</a:Key>< a:Value>An external agent prev ents acces s to a dat a store on the other side of t he trust b oundary.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>In teractionS tring</a:K ey><a:Valu e>VistA Co nnection E vents</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> 67d57081-a 947-4301-b 3b2-9d4d63 3203cb</b: SourceGuid ><b:State> AutoGenera ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>D5</b :TypeId><b :Upgraded> false</b:U pgraded><b :UserThrea tCategory i:nil="tru e"/><b:Use rThreatDes cription i :nil="true "/><b:User ThreatShor tDescripti on i:nil=" true"/><b: Wide>false </b:Wide>< /a:Value>< /a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K eyValueOfs tringThrea tpc_P0_PhO B><a:Key>D 467d57081- a947-4301- b3b2-9d4d6 33203cb936 82b96-1f6d -4b10-8468 -a0379e5eb 72dd7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /a:Key><a: Value xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Ch angedBy i: nil="true" /><b:Drawi ngSurfaceG uid>230787 9a-6671-43 9b-a5af-99 571be4ea24 </b:Drawin gSurfaceGu id><b:Flow Guid>93682 b96-1f6d-4 b10-8468-a 0379e5eb72 d</b:FlowG uid><b:Id> 47</b:Id>< b:Interact ionKey>67d 57081-a947 -4301-b3b2 -9d4d63320 3cb:93682b 96-1f6d-4b 10-8468-a0 379e5eb72d :d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :Interacti onKey><b:I nteraction String i:n il="true"/ ><b:Modifi edAt>0001- 01-01T00:0 0:00</b:Mo difiedAt>< b:Priority >High</b:P riority><b :Propertie s><a:KeyVa lueOfstrin gstring><a :Key>Title </a:Key><a :Value>Dat a Flow Vis tA Connect ion Event Is Potenti ally Inter rupted</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatCate gory</a:Ke y><a:Value >Denial Of Service</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatSh ortDescrip tion</a:Ke y><a:Value >Denial of Service h appens whe n the proc ess or a d atastore i s not able to servic e incoming requests or perform up to spe c.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atDescript ion</a:Key ><a:Value> An externa l agent in terrupts d ata flowin g across a trust bou ndary in e ither dire ction.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> VistA Conn ection Eve nts</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Priorit y</a:Key>< a:Value>Hi gh</a:Valu e></a:KeyV alueOfstri ngstring>< /b:Propert ies><b:Sou rceGuid>67 d57081-a94 7-4301-b3b 2-9d4d6332 03cb</b:So urceGuid>< b:State>Au toGenerate d</b:State ><b:StateI nformation i:nil="tr ue"/><b:Ta rgetGuid>d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:T argetGuid> <b:Title i :nil="true "/><b:Type Id>D4</b:T ypeId><b:U pgraded>fa lse</b:Upg raded><b:U serThreatC ategory i: nil="true" /><b:UserT hreatDescr iption i:n il="true"/ ><b:UserTh reatShortD escription i:nil="tr ue"/><b:Wi de>false</ b:Wide></a :Value></a :KeyValueO fstringThr eatpc_P0_P hOB><a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:Key>D2d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f6d6ef db7-d7f7-4 6d7-a4ac-1 6004f70edd e67d57081- a947-4301- b3b2-9d4d6 33203cb</a :Key><a:Va lue xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Chan gedBy i:ni l="true"/> <b:Drawing SurfaceGui d>2307879a -6671-439b -a5af-9957 1be4ea24</ b:DrawingS urfaceGuid ><b:FlowGu id>6d6efdb 7-d7f7-46d 7-a4ac-160 04f70edde< /b:FlowGui d><b:Id>6< /b:Id><b:I nteraction Key>d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f :6d6efdb7- d7f7-46d7- a4ac-16004 f70edde:67 d57081-a94 7-4301-b3b 2-9d4d6332 03cb</b:In teractionK ey><b:Inte ractionStr ing i:nil= "true"/><b :ModifiedA t>0001-01- 01T00:00:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Potent ial Excess ive Resour ce Consump tion for W ebVRAM or SQL Databa se</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Den ial Of Ser vice</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>Den ial of Ser vice happe ns when th e process or a datas tore is no t able to service in coming req uests or p erform up to spec.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatDe scription< /a:Key><a: Value>Does WebVRAM o r WebVRAM Database t ake explic it steps t o control resource c onsumption ? Resource consumpti on attacks can be ha rd to deal with, and there are times tha t it makes sense to let the OS do the jo b. Be care ful that y our resour ce request s don't de adlock, an d that the y do timeo ut.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Interac tionString </a:Key><a :Value>Que ry VistA C onnection Events</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Prio rity</a:Ke y><a:Value >High</a:V alue></a:K eyValueOfs tringstrin g></b:Prop erties><b: SourceGuid >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :SourceGui d><b:State >AutoGener ated</b:St ate><b:Sta teInformat ion i:nil= "true"/><b :TargetGui d>67d57081 -a947-4301 -b3b2-9d4d 633203cb</ b:TargetGu id><b:Titl e i:nil="t rue"/><b:T ypeId>D2</ b:TypeId>< b:Upgraded >false</b: Upgraded>< b:UserThre atCategory i:nil="tr ue"/><b:Us erThreatDe scription i:nil="tru e"/><b:Use rThreatSho rtDescript ion i:nil= "true"/><b :Wide>fals e</b:Wide> </a:Value> </a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: KeyValueOf stringThre atpc_P0_Ph OB><a:Key> D367d57081 -a947-4301 -b3b2-9d4d 633203cb93 682b96-1f6 d-4b10-846 8-a0379e5e b72dd7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>9368 2b96-1f6d- 4b10-8468- a0379e5eb7 2d</b:Flow Guid><b:Id >46</b:Id> <b:Interac tionKey>67 d57081-a94 7-4301-b3b 2-9d4d6332 03cb:93682 b96-1f6d-4 b10-8468-a 0379e5eb72 d:d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>0001 -01-01T00: 00:00</b:M odifiedAt> <b:Priorit y>High</b: Priority>< b:Properti es><a:KeyV alueOfstri ngstring>< a:Key>Titl e</a:Key>< a:Value>Po tential Pr ocess Cras h or Stop for WebVRA M</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Deni al Of Serv ice</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>Deni al of Serv ice happen s when the process o r a datast ore is not able to s ervice inc oming requ ests or pe rform up t o spec.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>WebVR AM crashes , halts, s tops or ru ns slowly; in all ca ses violat ing an ava ilability metric.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >VistA Con nection Ev ents</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Priori ty</a:Key> <a:Value>H igh</a:Val ue></a:Key ValueOfstr ingstring> </b:Proper ties><b:So urceGuid>6 7d57081-a9 47-4301-b3 b2-9d4d633 203cb</b:S ourceGuid> <b:State>A utoGenerat ed</b:Stat e><b:State Informatio n i:nil="t rue"/><b:T argetGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: TargetGuid ><b:Title i:nil="tru e"/><b:Typ eId>D3</b: TypeId><b: Upgraded>f alse</b:Up graded><b: UserThreat Category i :nil="true "/><b:User ThreatDesc ription i: nil="true" /><b:UserT hreatShort Descriptio n i:nil="t rue"/><b:W ide>false< /b:Wide></ a:Value></ a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:Key>R6 67d57081-a 947-4301-b 3b2-9d4d63 3203cb9368 2b96-1f6d- 4b10-8468- a0379e5eb7 2dd7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy i:n il="true"/ ><b:Drawin gSurfaceGu id>2307879 a-6671-439 b-a5af-995 71be4ea24< /b:Drawing SurfaceGui d><b:FlowG uid>93682b 96-1f6d-4b 10-8468-a0 379e5eb72d </b:FlowGu id><b:Id>4 5</b:Id><b :Interacti onKey>67d5 7081-a947- 4301-b3b2- 9d4d633203 cb:93682b9 6-1f6d-4b1 0-8468-a03 79e5eb72d: d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: Interactio nKey><b:In teractionS tring i:ni l="true"/> <b:Modifie dAt>0001-0 1-01T00:00 :00</b:Mod ifiedAt><b :Priority> High</b:Pr iority><b: Properties ><a:KeyVal ueOfstring string><a: Key>Title< /a:Key><a: Value>Pote ntial Data Repudiati on by WebV RAM</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatCategor y</a:Key>< a:Value>Re pudiation< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatS hortDescri ption</a:K ey><a:Valu e>Repudiat ion threat s involve an adversa ry denying that some thing happ ened.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatDescr iption</a: Key><a:Val ue>WebVRAM claims th at it did not receiv e data fro m a source outside t he trust b oundary. C onsider us ing loggin g or audit ing to rec ord the so urce, time , and summ ary of the received data.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>V istA Conne ction Even ts</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Priority </a:Key><a :Value>Hig h</a:Value ></a:KeyVa lueOfstrin gstring></ b:Properti es><b:Sour ceGuid>67d 57081-a947 -4301-b3b2 -9d4d63320 3cb</b:Sou rceGuid><b :State>Aut oGenerated </b:State> <b:StateIn formation i:nil="tru e"/><b:Tar getGuid>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:Ta rgetGuid>< b:Title i: nil="true" /><b:TypeI d>R6</b:Ty peId><b:Up graded>fal se</b:Upgr aded><b:Us erThreatCa tegory i:n il="true"/ ><b:UserTh reatDescri ption i:ni l="true"/> <b:UserThr eatShortDe scription i:nil="tru e"/><b:Wid e>false</b :Wide></a: Value></a: KeyValueOf stringThre atpc_P0_Ph OB><a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:Key>S267 d57081-a94 7-4301-b3b 2-9d4d6332 03cb93682b 96-1f6d-4b 10-8468-a0 379e5eb72d d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</a: Key><a:Val ue xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Chang edBy i:nil ="true"/>< b:DrawingS urfaceGuid >2307879a- 6671-439b- a5af-99571 be4ea24</b :DrawingSu rfaceGuid> <b:FlowGui d>93682b96 -1f6d-4b10 -8468-a037 9e5eb72d</ b:FlowGuid ><b:Id>44< /b:Id><b:I nteraction Key>67d570 81-a947-43 01-b3b2-9d 4d633203cb :93682b96- 1f6d-4b10- 8468-a0379 e5eb72d:d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:In teractionK ey><b:Inte ractionStr ing i:nil= "true"/><b :ModifiedA t>0001-01- 01T00:00:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Spoofi ng the Web VRAM Proce ss</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Spo ofing</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>Sp oofing is when a pro cess or en tity is so mething ot her than i ts claimed identity. Examples include su bstituting a process , a file, website or a network address.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Web VRAM may b e spoofed by an atta cker and t his may le ad to info rmation di sclosure b y WebVRAM Database. Consider u sing a sta ndard auth entication mechanism to identi fy the des tination p rocess.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >VistA Con nection Ev ents</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Priori ty</a:Key> <a:Value>H igh</a:Val ue></a:Key ValueOfstr ingstring> </b:Proper ties><b:So urceGuid>6 7d57081-a9 47-4301-b3 b2-9d4d633 203cb</b:S ourceGuid> <b:State>A utoGenerat ed</b:Stat e><b:State Informatio n i:nil="t rue"/><b:T argetGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: TargetGuid ><b:Title i:nil="tru e"/><b:Typ eId>S2</b: TypeId><b: Upgraded>f alse</b:Up graded><b: UserThreat Category i :nil="true "/><b:User ThreatDesc ription i: nil="true" /><b:UserT hreatShort Descriptio n i:nil="t rue"/><b:W ide>false< /b:Wide></ a:Value></ a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:Key>S7 67d57081-a 947-4301-b 3b2-9d4d63 3203cb9368 2b96-1f6d- 4b10-8468- a0379e5eb7 2dd7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy>VHA 21\DNS</b: ChangedBy> <b:Drawing SurfaceGui d>2307879a -6671-439b -a5af-9957 1be4ea24</ b:DrawingS urfaceGuid ><b:FlowGu id>93682b9 6-1f6d-4b1 0-8468-a03 79e5eb72d< /b:FlowGui d><b:Id>10 </b:Id><b: Interactio nKey>67d57 081-a947-4 301-b3b2-9 d4d633203c b:93682b96 -1f6d-4b10 -8468-a037 9e5eb72d:d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:I nteraction Key><b:Int eractionSt ring i:nil ="true"/>< b:Modified At>2017-06 -14T07:12: 50.4126977 -10:00</b: ModifiedAt ><b:Priori ty>High</b :Priority> <b:Propert ies><a:Key ValueOfstr ingstring> <a:Key>Tit le</a:Key> <a:Value>S poofing of Source Da ta Store S QL Databas e</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Spoo fing</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>Spo ofing is w hen a proc ess or ent ity is som ething oth er than it s claimed identity. Examples i nclude sub stituting a process, a file, w ebsite or a network address.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatDe scription< /a:Key><a: Value>WebV RAM Databa se may be spoofed by an attack er and thi s may lead to incorr ect data d elivered t o WebVRAM. Consider using a st andard aut henticatio n mechanis m to ident ify the so urce data store.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Stat eInformati on</a:Key> <a:Value>S SL used to identify source dat a store.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>In teractionS tring</a:K ey><a:Valu e>VistA Co nnection E vents</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> 67d57081-a 947-4301-b 3b2-9d4d63 3203cb</b: SourceGuid ><b:State> Mitigated< /b:State>< b:StateInf ormation i :nil="true "/><b:Targ etGuid>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</b:Tar getGuid><b :Title i:n il="true"/ ><b:TypeId >S7</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>T13.1 67d57081-a 947-4301-b 3b2-9d4d63 3203cb9368 2b96-1f6d- 4b10-8468- a0379e5eb7 2dd7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy>VHA 21\DNS</b: ChangedBy> <b:Drawing SurfaceGui d>2307879a -6671-439b -a5af-9957 1be4ea24</ b:DrawingS urfaceGuid ><b:FlowGu id>93682b9 6-1f6d-4b1 0-8468-a03 79e5eb72d< /b:FlowGui d><b:Id>11 </b:Id><b: Interactio nKey>67d57 081-a947-4 301-b3b2-9 d4d633203c b:93682b96 -1f6d-4b10 -8468-a037 9e5eb72d:d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:I nteraction Key><b:Int eractionSt ring i:nil ="true"/>< b:Modified At>2017-06 -14T07:13: 25.0881649 -10:00</b: ModifiedAt ><b:Priori ty>High</b :Priority> <b:Propert ies><a:Key ValueOfstr ingstring> <a:Key>Tit le</a:Key> <a:Value>C ross Site Scripting< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatC ategory</a :Key><a:Va lue>Tamper ing</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>Tamp ering is t he act of altering t he bits. T ampering w ith a proc ess involv es changin g bits in the runnin g process. Similarly , Tamperin g with a d ata flow i nvolves ch anging bit s on the w ire or bet ween two r unning pro cesses.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>The w eb server 'WebVRAM' could be a subject t o a cross- site scrip ting attac k because it does no t sanitize untrusted input.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Sta teInformat ion</a:Key ><a:Value> All input is sanitiz ed.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Interac tionString </a:Key><a :Value>Vis tA Connect ion Events </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Priority</ a:Key><a:V alue>High< /a:Value>< /a:KeyValu eOfstrings tring></b: Properties ><b:Source Guid>67d57 081-a947-4 301-b3b2-9 d4d633203c b</b:Sourc eGuid><b:S tate>Mitig ated</b:St ate><b:Sta teInformat ion i:nil= "true"/><b :TargetGui d>d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:TargetGu id><b:Titl e i:nil="t rue"/><b:T ypeId>T13. 1</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K ey>T13.267 d57081-a94 7-4301-b3b 2-9d4d6332 03cb93682b 96-1f6d-4b 10-8468-a0 379e5eb72d d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</a: Key><a:Val ue xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Chang edBy i:nil ="true"/>< b:DrawingS urfaceGuid >2307879a- 6671-439b- a5af-99571 be4ea24</b :DrawingSu rfaceGuid> <b:FlowGui d>93682b96 -1f6d-4b10 -8468-a037 9e5eb72d</ b:FlowGuid ><b:Id>12< /b:Id><b:I nteraction Key>67d570 81-a947-43 01-b3b2-9d 4d633203cb :93682b96- 1f6d-4b10- 8468-a0379 e5eb72d:d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:In teractionK ey><b:Inte ractionStr ing i:nil= "true"/><b :ModifiedA t>0001-01- 01T00:00:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Persis tent Cross Site Scri pting</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatCateg ory</a:Key ><a:Value> Tampering< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatS hortDescri ption</a:K ey><a:Valu e>Tamperin g is the a ct of alte ring the b its. Tampe ring with a process involves c hanging bi ts in the running pr ocess. Sim ilarly, Ta mpering wi th a data flow invol ves changi ng bits on the wire or between two runni ng process es.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatDescrip tion</a:Ke y><a:Value >The web s erver 'Web VRAM' coul d be a sub ject to a persistent cross-sit e scriptin g attack b ecause it does not s anitize da ta store ' WebVRAM Da tabase' in puts and o utput.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> VistA Conn ection Eve nts</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Priorit y</a:Key>< a:Value>Hi gh</a:Valu e></a:KeyV alueOfstri ngstring>< /b:Propert ies><b:Sou rceGuid>67 d57081-a94 7-4301-b3b 2-9d4d6332 03cb</b:So urceGuid>< b:State>Au toGenerate d</b:State ><b:StateI nformation i:nil="tr ue"/><b:Ta rgetGuid>d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:T argetGuid> <b:Title i :nil="true "/><b:Type Id>T13.2</ b:TypeId>< b:Upgraded >false</b: Upgraded>< b:UserThre atCategory i:nil="tr ue"/><b:Us erThreatDe scription i:nil="tru e"/><b:Use rThreatSho rtDescript ion i:nil= "true"/><b :Wide>fals e</b:Wide> </a:Value> </a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: KeyValueOf stringThre atpc_P0_Ph OB><a:Key> D5d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f6d 6efdb7-d7f 7-46d7-a4a c-16004f70 edde67d570 81-a947-43 01-b3b2-9d 4d633203cb </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>6d6e fdb7-d7f7- 46d7-a4ac- 16004f70ed de</b:Flow Guid><b:Id >43</b:Id> <b:Interac tionKey>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f:6d6ef db7-d7f7-4 6d7-a4ac-1 6004f70edd e:67d57081 -a947-4301 -b3b2-9d4d 633203cb</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>0001 -01-01T00: 00:00</b:M odifiedAt> <b:Priorit y>High</b: Priority>< b:Properti es><a:KeyV alueOfstri ngstring>< a:Key>Titl e</a:Key>< a:Value>Da ta Store I naccessibl e</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Deni al Of Serv ice</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>Deni al of Serv ice happen s when the process o r a datast ore is not able to s ervice inc oming requ ests or pe rform up t o spec.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>An ex ternal age nt prevent s access t o a data s tore on th e other si de of the trust boun dary.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>Q uery VistA Connectio n Events</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Pr iority</a: Key><a:Val ue>High</a :Value></a :KeyValueO fstringstr ing></b:Pr operties>< b:SourceGu id>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:SourceG uid><b:Sta te>AutoGen erated</b: State><b:S tateInform ation i:ni l="true"/> <b:TargetG uid>67d570 81-a947-43 01-b3b2-9d 4d633203cb </b:Target Guid><b:Ti tle i:nil= "true"/><b :TypeId>D5 </b:TypeId ><b:Upgrad ed>false</ b:Upgraded ><b:UserTh reatCatego ry i:nil=" true"/><b: UserThreat Descriptio n i:nil="t rue"/><b:U serThreatS hortDescri ption i:ni l="true"/> <b:Wide>fa lse</b:Wid e></a:Valu e></a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke y>I2367d57 081-a947-4 301-b3b2-9 d4d633203c b93682b96- 1f6d-4b10- 8468-a0379 e5eb72dd7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y>VHA21\DN S</b:Chang edBy><b:Dr awingSurfa ceGuid>230 7879a-6671 -439b-a5af -99571be4e a24</b:Dra wingSurfac eGuid><b:F lowGuid>93 682b96-1f6 d-4b10-846 8-a0379e5e b72d</b:Fl owGuid><b: Id>14</b:I d><b:Inter actionKey> 67d57081-a 947-4301-b 3b2-9d4d63 3203cb:936 82b96-1f6d -4b10-8468 -a0379e5eb 72d:d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Intera ctionKey>< b:Interact ionString i:nil="tru e"/><b:Mod ifiedAt>20 17-06-14T0 7:17:08.13 44673-10:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Weak A ccess Cont rol for a Resource</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatCa tegory</a: Key><a:Val ue>Informa tion Discl osure</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>In formation disclosure happens w hen the in formation can be rea d by an un authorized party.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>Impro per data p rotection of WebVRAM Database can allow an attacke r to read informatio n not inte nded for d isclosure. Review au thorizatio n settings .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >StateInfo rmation</a :Key><a:Va lue>Databa se uses a dedicated account wh ich is onl y used in the web ap plication. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>VistA Connection Events</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Pri ority</a:K ey><a:Valu e>High</a: Value></a: KeyValueOf stringstri ng></b:Pro perties><b :SourceGui d>67d57081 -a947-4301 -b3b2-9d4d 633203cb</ b:SourceGu id><b:Stat e>Mitigate d</b:State ><b:StateI nformation i:nil="tr ue"/><b:Ta rgetGuid>d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:T argetGuid> <b:Title i :nil="true "/><b:Type Id>I23</b: TypeId><b: Upgraded>f alse</b:Up graded><b: UserThreat Category i :nil="true "/><b:User ThreatDesc ription i: nil="true" /><b:UserT hreatShort Descriptio n i:nil="t rue"/><b:W ide>false< /b:Wide></ a:Value></ a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:Key>D4 d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f6d6e fdb7-d7f7- 46d7-a4ac- 16004f70ed de67d57081 -a947-4301 -b3b2-9d4d 633203cb</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy i:n il="true"/ ><b:Drawin gSurfaceGu id>2307879 a-6671-439 b-a5af-995 71be4ea24< /b:Drawing SurfaceGui d><b:FlowG uid>6d6efd b7-d7f7-46 d7-a4ac-16 004f70edde </b:FlowGu id><b:Id>4 2</b:Id><b :Interacti onKey>d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f:6d6efdb 7-d7f7-46d 7-a4ac-160 04f70edde: 67d57081-a 947-4301-b 3b2-9d4d63 3203cb</b: Interactio nKey><b:In teractionS tring i:ni l="true"/> <b:Modifie dAt>0001-0 1-01T00:00 :00</b:Mod ifiedAt><b :Priority> High</b:Pr iority><b: Properties ><a:KeyVal ueOfstring string><a: Key>Title< /a:Key><a: Value>Data Flow Quer y VistA Co nnection E vents Is P otentially Interrupt ed</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Den ial Of Ser vice</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>Den ial of Ser vice happe ns when th e process or a datas tore is no t able to service in coming req uests or p erform up to spec.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatDe scription< /a:Key><a: Value>An e xternal ag ent interr upts data flowing ac ross a tru st boundar y in eithe r directio n.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Quer y VistA Co nnection E vents</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: SourceGuid ><b:State> AutoGenera ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >67d57081- a947-4301- b3b2-9d4d6 33203cb</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>D4</b :TypeId><b :Upgraded> false</b:U pgraded><b :UserThrea tCategory i:nil="tru e"/><b:Use rThreatDes cription i :nil="true "/><b:User ThreatShor tDescripti on i:nil=" true"/><b: Wide>false </b:Wide>< /a:Value>< /a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K eyValueOfs tringThrea tpc_P0_PhO B><a:Key>I 6d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f6d6 efdb7-d7f7 -46d7-a4ac -16004f70e dde67d5708 1-a947-430 1-b3b2-9d4 d633203cb< /a:Key><a: Value xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Ch angedBy i: nil="true" /><b:Drawi ngSurfaceG uid>230787 9a-6671-43 9b-a5af-99 571be4ea24 </b:Drawin gSurfaceGu id><b:Flow Guid>6d6ef db7-d7f7-4 6d7-a4ac-1 6004f70edd e</b:FlowG uid><b:Id> 41</b:Id>< b:Interact ionKey>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f:6d6efd b7-d7f7-46 d7-a4ac-16 004f70edde :67d57081- a947-4301- b3b2-9d4d6 33203cb</b :Interacti onKey><b:I nteraction String i:n il="true"/ ><b:Modifi edAt>0001- 01-01T00:0 0:00</b:Mo difiedAt>< b:Priority >High</b:P riority><b :Propertie s><a:KeyVa lueOfstrin gstring><a :Key>Title </a:Key><a :Value>Dat a Flow Sni ffing</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatCateg ory</a:Key ><a:Value> Informatio n Disclosu re</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atShortDes cription</ a:Key><a:V alue>Infor mation dis closure ha ppens when the infor mation can be read b y an unaut horized pa rty.</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatDescri ption</a:K ey><a:Valu e>Data flo wing acros s Query Vi stA Connec tion Event s may be s niffed by an attacke r. Dependi ng on what type of d ata an att acker can read, it m ay be used to attack other par ts of the system or simply be a disclosu re of info rmation le ading to c ompliance violations . Consider encryptin g the data flow.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> Query Vist A Connecti on Events< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Source Guid><b:St ate>AutoGe nerated</b :State><b: StateInfor mation i:n il="true"/ ><b:Target Guid>67d57 081-a947-4 301-b3b2-9 d4d633203c b</b:Targe tGuid><b:T itle i:nil ="true"/>< b:TypeId>I 6</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K ey>R8d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f6d6efdb7- d7f7-46d7- a4ac-16004 f70edde67d 57081-a947 -4301-b3b2 -9d4d63320 3cb</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y i:nil="t rue"/><b:D rawingSurf aceGuid>23 07879a-667 1-439b-a5a f-99571be4 ea24</b:Dr awingSurfa ceGuid><b: FlowGuid>6 d6efdb7-d7 f7-46d7-a4 ac-16004f7 0edde</b:F lowGuid><b :Id>40</b: Id><b:Inte ractionKey >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f:6d 6efdb7-d7f 7-46d7-a4a c-16004f70 edde:67d57 081-a947-4 301-b3b2-9 d4d633203c b</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>0 001-01-01T 00:00:00</ b:Modified At><b:Prio rity>High< /b:Priorit y><b:Prope rties><a:K eyValueOfs tringstrin g><a:Key>T itle</a:Ke y><a:Value >Data Stor e Denies W ebVRAM Dat abase Pote ntially Wr iting Data </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Category</ a:Key><a:V alue>Repud iation</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatShor tDescripti on</a:Key> <a:Value>R epudiation threats i nvolve an adversary denying th at somethi ng happene d.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atDescript ion</a:Key ><a:Value> WebVRAM Da tabase cla ims that i t did not write data received from an en tity on th e other si de of the trust boun dary. Cons ider using logging o r auditing to record the sourc e, time, a nd summary of the re ceived dat a.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Quer y VistA Co nnection E vents</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: SourceGuid ><b:State> AutoGenera ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >67d57081- a947-4301- b3b2-9d4d6 33203cb</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>R8</b :TypeId><b :Upgraded> false</b:U pgraded><b :UserThrea tCategory i:nil="tru e"/><b:Use rThreatDes cription i :nil="true "/><b:User ThreatShor tDescripti on i:nil=" true"/><b: Wide>false </b:Wide>< /a:Value>< /a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K eyValueOfs tringThrea tpc_P0_PhO B><a:Key>T 18d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f6d 6efdb7-d7f 7-46d7-a4a c-16004f70 edde67d570 81-a947-43 01-b3b2-9d 4d633203cb </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>6d6e fdb7-d7f7- 46d7-a4ac- 16004f70ed de</b:Flow Guid><b:Id >39</b:Id> <b:Interac tionKey>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f:6d6ef db7-d7f7-4 6d7-a4ac-1 6004f70edd e:67d57081 -a947-4301 -b3b2-9d4d 633203cb</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>0001 -01-01T00: 00:00</b:M odifiedAt> <b:Priorit y>High</b: Priority>< b:Properti es><a:KeyV alueOfstri ngstring>< a:Key>Titl e</a:Key>< a:Value>Th e WebVRAM Database D ata Store Could Be C orrupted</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatCa tegory</a: Key><a:Val ue>Tamperi ng</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atShortDes cription</ a:Key><a:V alue>Tampe ring is th e act of a ltering th e bits. Ta mpering wi th a proce ss involve s changing bits in t he running process. Similarly, Tampering with a da ta flow in volves cha nging bits on the wi re or betw een two ru nning proc esses.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatDesc ription</a :Key><a:Va lue>Data f lowing acr oss Query VistA Conn ection Eve nts may be tampered with by an attacker. This may lead to co rruption o f WebVRAM Database. Ensure the integrity of the da ta flow to the data store.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> Query Vist A Connecti on Events< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Source Guid><b:St ate>AutoGe nerated</b :State><b: StateInfor mation i:n il="true"/ ><b:Target Guid>67d57 081-a947-4 301-b3b2-9 d4d633203c b</b:Targe tGuid><b:T itle i:nil ="true"/>< b:TypeId>T 18</b:Type Id><b:Upgr aded>false </b:Upgrad ed><b:User ThreatCate gory i:nil ="true"/>< b:UserThre atDescript ion i:nil= "true"/><b :UserThrea tShortDesc ription i: nil="true" /><b:Wide> false</b:W ide></a:Va lue></a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: Key>S1d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f6d6efdb7 -d7f7-46d7 -a4ac-1600 4f70edde67 d57081-a94 7-4301-b3b 2-9d4d6332 03cb</a:Ke y><a:Value xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Changed By i:nil=" true"/><b: DrawingSur faceGuid>2 307879a-66 71-439b-a5 af-99571be 4ea24</b:D rawingSurf aceGuid><b :FlowGuid> 6d6efdb7-d 7f7-46d7-a 4ac-16004f 70edde</b: FlowGuid>< b:Id>38</b :Id><b:Int eractionKe y>d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f:6 d6efdb7-d7 f7-46d7-a4 ac-16004f7 0edde:67d5 7081-a947- 4301-b3b2- 9d4d633203 cb</b:Inte ractionKey ><b:Intera ctionStrin g i:nil="t rue"/><b:M odifiedAt> 0001-01-01 T00:00:00< /b:Modifie dAt><b:Pri ority>High </b:Priori ty><b:Prop erties><a: KeyValueOf stringstri ng><a:Key> Title</a:K ey><a:Valu e>Spoofing the WebVR AM Process </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Category</ a:Key><a:V alue>Spoof ing</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>Spoo fing is wh en a proce ss or enti ty is some thing othe r than its claimed i dentity. E xamples in clude subs tituting a process, a file, we bsite or a network a ddress.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>WebVR AM may be spoofed by an attack er and thi s may lead to unauth orized acc ess to Web VRAM Datab ase. Consi der using a standard authentic ation mech anism to i dentify th e source p rocess.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >Query Vis tA Connect ion Events </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Priority</ a:Key><a:V alue>High< /a:Value>< /a:KeyValu eOfstrings tring></b: Properties ><b:Source Guid>d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Sourc eGuid><b:S tate>AutoG enerated</ b:State><b :StateInfo rmation i: nil="true" /><b:Targe tGuid>67d5 7081-a947- 4301-b3b2- 9d4d633203 cb</b:Targ etGuid><b: Title i:ni l="true"/> <b:TypeId> S1</b:Type Id><b:Upgr aded>false </b:Upgrad ed><b:User ThreatCate gory i:nil ="true"/>< b:UserThre atDescript ion i:nil= "true"/><b :UserThrea tShortDesc ription i: nil="true" /><b:Wide> false</b:W ide></a:Va lue></a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: Key>D4d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f62e9d030 -f66e-488d -87d0-5884 69f9681457 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e</a:Ke y><a:Value xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Knowl edgeBase"> <b:Changed By i:nil=" true"/><b: DrawingSur faceGuid>2 307879a-66 71-439b-a5 af-99571be 4ea24</b:D rawingSurf aceGuid><b :FlowGuid> 62e9d030-f 66e-488d-8 7d0-588469 f96814</b: FlowGuid>< b:Id>53</b :Id><b:Int eractionKe y>d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f:6 2e9d030-f6 6e-488d-87 d0-588469f 96814:577b ec78-2ceb- 4b5f-81d8- fdf92cda3a 2e</b:Inte ractionKey ><b:Intera ctionStrin g i:nil="t rue"/><b:M odifiedAt> 0001-01-01 T00:00:00< /b:Modifie dAt><b:Pri ority>High </b:Priori ty><b:Prop erties><a: KeyValueOf stringstri ng><a:Key> Title</a:K ey><a:Valu e>Data Flo w Generic Data Flow Is Potenti ally Inter rupted</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatCate gory</a:Ke y><a:Value >Denial Of Service</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatSh ortDescrip tion</a:Ke y><a:Value >Denial of Service h appens whe n the proc ess or a d atastore i s not able to servic e incoming requests or perform up to spe c.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atDescript ion</a:Key ><a:Value> An externa l agent in terrupts d ata flowin g across a trust bou ndary in e ither dire ction.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> A/V codes to authent icate user </a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Priority< /a:Key><a: Value>High </a:Value> </a:KeyVal ueOfstring string></b :Propertie s><b:Sourc eGuid>d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</b:Sour ceGuid><b: State>Auto Generated< /b:State>< b:StateInf ormation i :nil="true "/><b:Targ etGuid>577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e</b:Tar getGuid><b :Title i:n il="true"/ ><b:TypeId >D4</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>S3322 b3360-cf25 -454c-a328 -a52ac3b88 c0acfedae7 1-be4b-423 4-9a5b-aa0 18f5dd6d9d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</a:K ey><a:Valu e xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Change dBy>VHA21\ DNS</b:Cha ngedBy><b: DrawingSur faceGuid>2 307879a-66 71-439b-a5 af-99571be 4ea24</b:D rawingSurf aceGuid><b :FlowGuid> cfedae71-b e4b-4234-9 a5b-aa018f 5dd6d9</b: FlowGuid>< b:Id>21</b :Id><b:Int eractionKe y>322b3360 -cf25-454c -a328-a52a c3b88c0a:c fedae71-be 4b-4234-9a 5b-aa018f5 dd6d9:d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</b:Inte ractionKey ><b:Intera ctionStrin g i:nil="t rue"/><b:M odifiedAt> 2017-06-14 T07:17:36. 3872923-10 :00</b:Mod ifiedAt><b :Priority> High</b:Pr iority><b: Properties ><a:KeyVal ueOfstring string><a: Key>Title< /a:Key><a: Value>Spoo fing the B rowser Ext ernal Enti ty</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Spo ofing</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>Sp oofing is when a pro cess or en tity is so mething ot her than i ts claimed identity. Examples include su bstituting a process , a file, website or a network address.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Bro wser may b e spoofed by an atta cker and t his may le ad to unau thorized a ccess to W ebVRAM. Co nsider usi ng a stand ard authen tication m echanism t o identify the exter nal entity .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >StateInfo rmation</a :Key><a:Va lue>Using IAM authen tication m echanism.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>I nteraction String</a: Key><a:Val ue>Request s</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Priority< /a:Key><a: Value>High </a:Value> </a:KeyVal ueOfstring string></b :Propertie s><b:Sourc eGuid>322b 3360-cf25- 454c-a328- a52ac3b88c 0a</b:Sour ceGuid><b: State>Miti gated</b:S tate><b:St ateInforma tion i:nil ="true"/>< b:TargetGu id>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:TargetG uid><b:Tit le i:nil=" true"/><b: TypeId>S3< /b:TypeId> <b:Upgrade d>false</b :Upgraded> <b:UserThr eatCategor y i:nil="t rue"/><b:U serThreatD escription i:nil="tr ue"/><b:Us erThreatSh ortDescrip tion i:nil ="true"/>< b:Wide>fal se</b:Wide ></a:Value ></a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :KeyValueO fstringThr eatpc_P0_P hOB><a:Key >R7d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f6 2e9d030-f6 6e-488d-87 d0-588469f 96814577be c78-2ceb-4 b5f-81d8-f df92cda3a2 e</a:Key>< a:Value xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: ChangedBy i:nil="tru e"/><b:Dra wingSurfac eGuid>2307 879a-6671- 439b-a5af- 99571be4ea 24</b:Draw ingSurface Guid><b:Fl owGuid>62e 9d030-f66e -488d-87d0 -588469f96 814</b:Flo wGuid><b:I d>52</b:Id ><b:Intera ctionKey>d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f:62e9 d030-f66e- 488d-87d0- 588469f968 14:577bec7 8-2ceb-4b5 f-81d8-fdf 92cda3a2e< /b:Interac tionKey><b :Interacti onString i :nil="true "/><b:Modi fiedAt>000 1-01-01T00 :00:00</b: ModifiedAt ><b:Priori ty>High</b :Priority> <b:Propert ies><a:Key ValueOfstr ingstring> <a:Key>Tit le</a:Key> <a:Value>E xternal En tity Claim s VistA sy stem Poten tially Den ies Receiv ing Data</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatCa tegory</a: Key><a:Val ue>Repudia tion</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>Rep udiation t hreats inv olve an ad versary de nying that something happened. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Descriptio n</a:Key>< a:Value>Vi stA (Claim s Instance ) claims t hat it did not recei ve data fr om a proce ss on the other side of the tr ust bounda ry. Consid er using l ogging or auditing t o record t he source, time, and summary o f the rece ived data. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>A/V co des to aut henticate user </a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: SourceGuid ><b:State> AutoGenera ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>R7</b :TypeId><b :Upgraded> false</b:U pgraded><b :UserThrea tCategory i:nil="tru e"/><b:Use rThreatDes cription i :nil="true "/><b:User ThreatShor tDescripti on i:nil=" true"/><b: Wide>false </b:Wide>< /a:Value>< /a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K eyValueOfs tringThrea tpc_P0_PhO B><a:Key>T 13.1322b33 60-cf25-45 4c-a328-a5 2ac3b88c0a cfedae71-b e4b-4234-9 a5b-aa018f 5dd6d9d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</a:Key> <a:Value x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :ChangedBy >VHA21\DNS </b:Change dBy><b:Dra wingSurfac eGuid>2307 879a-6671- 439b-a5af- 99571be4ea 24</b:Draw ingSurface Guid><b:Fl owGuid>cfe dae71-be4b -4234-9a5b -aa018f5dd 6d9</b:Flo wGuid><b:I d>23</b:Id ><b:Intera ctionKey>3 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a:cfed ae71-be4b- 4234-9a5b- aa018f5dd6 d9:d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:Interac tionKey><b :Interacti onString i :nil="true "/><b:Modi fiedAt>201 7-06-14T07 :18:58.358 4886-10:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Cross S ite Script ing</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatCategor y</a:Key>< a:Value>Ta mpering</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatSho rtDescript ion</a:Key ><a:Value> Tampering is the act of alteri ng the bit s. Tamperi ng with a process in volves cha nging bits in the ru nning proc ess. Simil arly, Tamp ering with a data fl ow involve s changing bits on t he wire or between t wo running processes .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tDescripti on</a:Key> <a:Value>T he web ser ver 'WebVR AM' could be a subje ct to a cr oss-site s cripting a ttack beca use it doe s not sani tize untru sted input .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >StateInfo rmation</a :Key><a:Va lue>All in put is san itized.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >Requests< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>322b33 60-cf25-45 4c-a328-a5 2ac3b88c0a </b:Source Guid><b:St ate>Mitiga ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>T13.1 </b:TypeId ><b:Upgrad ed>false</ b:Upgraded ><b:UserTh reatCatego ry i:nil=" true"/><b: UserThreat Descriptio n i:nil="t rue"/><b:U serThreatS hortDescri ption i:ni l="true"/> <b:Wide>fa lse</b:Wid e></a:Valu e></a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke y>R6322b33 60-cf25-45 4c-a328-a5 2ac3b88c0a cfedae71-b e4b-4234-9 a5b-aa018f 5dd6d9d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</a:Key> <a:Value x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :ChangedBy i:nil="tr ue"/><b:Dr awingSurfa ceGuid>230 7879a-6671 -439b-a5af -99571be4e a24</b:Dra wingSurfac eGuid><b:F lowGuid>cf edae71-be4 b-4234-9a5 b-aa018f5d d6d9</b:Fl owGuid><b: Id>24</b:I d><b:Inter actionKey> 322b3360-c f25-454c-a 328-a52ac3 b88c0a:cfe dae71-be4b -4234-9a5b -aa018f5dd 6d9:d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Intera ctionKey>< b:Interact ionString i:nil="tru e"/><b:Mod ifiedAt>00 01-01-01T0 0:00:00</b :ModifiedA t><b:Prior ity>High</ b:Priority ><b:Proper ties><a:Ke yValueOfst ringstring ><a:Key>Ti tle</a:Key ><a:Value> Potential Data Repud iation by WebVRAM</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatCat egory</a:K ey><a:Valu e>Repudiat ion</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>Repu diation th reats invo lve an adv ersary den ying that something happened.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Web VRAM claim s that it did not re ceive data from a so urce outsi de the tru st boundar y. Conside r using lo gging or a uditing to record th e source, time, and summary of the recei ved data.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>I nteraction String</a: Key><a:Val ue>Request s</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Priority< /a:Key><a: Value>High </a:Value> </a:KeyVal ueOfstring string></b :Propertie s><b:Sourc eGuid>322b 3360-cf25- 454c-a328- a52ac3b88c 0a</b:Sour ceGuid><b: State>Auto Generated< /b:State>< b:StateInf ormation i :nil="true "/><b:Targ etGuid>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</b:Tar getGuid><b :Title i:n il="true"/ ><b:TypeId >R6</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>S8d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f62e9d03 0-f66e-488 d-87d0-588 469f968145 77bec78-2c eb-4b5f-81 d8-fdf92cd a3a2e</a:K ey><a:Valu e xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Change dBy i:nil= "true"/><b :DrawingSu rfaceGuid> 2307879a-6 671-439b-a 5af-99571b e4ea24</b: DrawingSur faceGuid>< b:FlowGuid >62e9d030- f66e-488d- 87d0-58846 9f96814</b :FlowGuid> <b:Id>51</ b:Id><b:In teractionK ey>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f: 62e9d030-f 66e-488d-8 7d0-588469 f96814:577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e</b:Int eractionKe y><b:Inter actionStri ng i:nil=" true"/><b: ModifiedAt >0001-01-0 1T00:00:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Spoofin g of the C laims Vist A system E xternal De stination Entity</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatCate gory</a:Ke y><a:Value >Spoofing< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatS hortDescri ption</a:K ey><a:Valu e>Spoofing is when a process o r entity i s somethin g other th an its cla imed ident ity. Examp les includ e substitu ting a pro cess, a fi le, websit e or a net work addre ss.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatDescrip tion</a:Ke y><a:Value >VistA (Cl aims Insta nce) may b e spoofed by an atta cker and t his may le ad to data being sen t to the a ttacker's target ins tead of Vi stA (Claim s Instance ). Conside r using a standard a uthenticat ion mechan ism to ide ntify the external e ntity.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> A/V codes to authent icate user </a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Priority< /a:Key><a: Value>High </a:Value> </a:KeyVal ueOfstring string></b :Propertie s><b:Sourc eGuid>d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</b:Sour ceGuid><b: State>Auto Generated< /b:State>< b:StateInf ormation i :nil="true "/><b:Targ etGuid>577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e</b:Tar getGuid><b :Title i:n il="true"/ ><b:TypeId >S8</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>D3322 b3360-cf25 -454c-a328 -a52ac3b88 c0acfedae7 1-be4b-423 4-9a5b-aa0 18f5dd6d9d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</a:K ey><a:Valu e xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Change dBy i:nil= "true"/><b :DrawingSu rfaceGuid> 2307879a-6 671-439b-a 5af-99571b e4ea24</b: DrawingSur faceGuid>< b:FlowGuid >cfedae71- be4b-4234- 9a5b-aa018 f5dd6d9</b :FlowGuid> <b:Id>26</ b:Id><b:In teractionK ey>322b336 0-cf25-454 c-a328-a52 ac3b88c0a: cfedae71-b e4b-4234-9 a5b-aa018f 5dd6d9:d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</b:Int eractionKe y><b:Inter actionStri ng i:nil=" true"/><b: ModifiedAt >0001-01-0 1T00:00:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Potenti al Process Crash or Stop for W ebVRAM</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatCate gory</a:Ke y><a:Value >Denial Of Service</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatSh ortDescrip tion</a:Ke y><a:Value >Denial of Service h appens whe n the proc ess or a d atastore i s not able to servic e incoming requests or perform up to spe c.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atDescript ion</a:Key ><a:Value> WebVRAM cr ashes, hal ts, stops or runs sl owly; in a ll cases v iolating a n availabi lity metri c.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Requ ests</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Priori ty</a:Key> <a:Value>H igh</a:Val ue></a:Key ValueOfstr ingstring> </b:Proper ties><b:So urceGuid>3 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a</b:S ourceGuid> <b:State>A utoGenerat ed</b:Stat e><b:State Informatio n i:nil="t rue"/><b:T argetGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: TargetGuid ><b:Title i:nil="tru e"/><b:Typ eId>D3</b: TypeId><b: Upgraded>f alse</b:Up graded><b: UserThreat Category i :nil="true "/><b:User ThreatDesc ription i: nil="true" /><b:UserT hreatShort Descriptio n i:nil="t rue"/><b:W ide>false< /b:Wide></ a:Value></ a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:Key>D4 322b3360-c f25-454c-a 328-a52ac3 b88c0acfed ae71-be4b- 4234-9a5b- aa018f5dd6 d9d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy i:n il="true"/ ><b:Drawin gSurfaceGu id>2307879 a-6671-439 b-a5af-995 71be4ea24< /b:Drawing SurfaceGui d><b:FlowG uid>cfedae 71-be4b-42 34-9a5b-aa 018f5dd6d9 </b:FlowGu id><b:Id>2 7</b:Id><b :Interacti onKey>322b 3360-cf25- 454c-a328- a52ac3b88c 0a:cfedae7 1-be4b-423 4-9a5b-aa0 18f5dd6d9: d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: Interactio nKey><b:In teractionS tring i:ni l="true"/> <b:Modifie dAt>0001-0 1-01T00:00 :00</b:Mod ifiedAt><b :Priority> High</b:Pr iority><b: Properties ><a:KeyVal ueOfstring string><a: Key>Title< /a:Key><a: Value>Data Flow Gene ric Data F low Is Pot entially I nterrupted </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Category</ a:Key><a:V alue>Denia l Of Servi ce</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atShortDes cription</ a:Key><a:V alue>Denia l of Servi ce happens when the process or a datasto re is not able to se rvice inco ming reque sts or per form up to spec.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatDesc ription</a :Key><a:Va lue>An ext ernal agen t interrup ts data fl owing acro ss a trust boundary in either direction. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>Reques ts</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Priority </a:Key><a :Value>Hig h</a:Value ></a:KeyVa lueOfstrin gstring></ b:Properti es><b:Sour ceGuid>322 b3360-cf25 -454c-a328 -a52ac3b88 c0a</b:Sou rceGuid><b :State>Aut oGenerated </b:State> <b:StateIn formation i:nil="tru e"/><b:Tar getGuid>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:Ta rgetGuid>< b:Title i: nil="true" /><b:TypeI d>D4</b:Ty peId><b:Up graded>fal se</b:Upgr aded><b:Us erThreatCa tegory i:n il="true"/ ><b:UserTh reatDescri ption i:ni l="true"/> <b:UserThr eatShortDe scription i:nil="tru e"/><b:Wid e>false</b :Wide></a: Value></a: KeyValueOf stringThre atpc_P0_Ph OB><a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:Key>E532 2b3360-cf2 5-454c-a32 8-a52ac3b8 8c0acfedae 71-be4b-42 34-9a5b-aa 018f5dd6d9 d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</a: Key><a:Val ue xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Chang edBy i:nil ="true"/>< b:DrawingS urfaceGuid >2307879a- 6671-439b- a5af-99571 be4ea24</b :DrawingSu rfaceGuid> <b:FlowGui d>cfedae71 -be4b-4234 -9a5b-aa01 8f5dd6d9</ b:FlowGuid ><b:Id>28< /b:Id><b:I nteraction Key>322b33 60-cf25-45 4c-a328-a5 2ac3b88c0a :cfedae71- be4b-4234- 9a5b-aa018 f5dd6d9:d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:In teractionK ey><b:Inte ractionStr ing i:nil= "true"/><b :ModifiedA t>0001-01- 01T00:00:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Elevat ion Using Impersonat ion</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatCategor y</a:Key>< a:Value>El evation Of Privilege </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat ShortDescr iption</a: Key><a:Val ue>A user subject ga ins increa sed capabi lity or pr ivilege by taking ad vantage of an implem entation b ug.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatDescrip tion</a:Ke y><a:Value >WebVRAM m ay be able to impers onate the context of Browser i n order to gain addi tional pri vilege.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >Requests< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>322b33 60-cf25-45 4c-a328-a5 2ac3b88c0a </b:Source Guid><b:St ate>AutoGe nerated</b :State><b: StateInfor mation i:n il="true"/ ><b:Target Guid>d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Targe tGuid><b:T itle i:nil ="true"/>< b:TypeId>E 5</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K ey>E6322b3 360-cf25-4 54c-a328-a 52ac3b88c0 acfedae71- be4b-4234- 9a5b-aa018 f5dd6d9d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y i:nil="t rue"/><b:D rawingSurf aceGuid>23 07879a-667 1-439b-a5a f-99571be4 ea24</b:Dr awingSurfa ceGuid><b: FlowGuid>c fedae71-be 4b-4234-9a 5b-aa018f5 dd6d9</b:F lowGuid><b :Id>29</b: Id><b:Inte ractionKey >322b3360- cf25-454c- a328-a52ac 3b88c0a:cf edae71-be4 b-4234-9a5 b-aa018f5d d6d9:d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>0 001-01-01T 00:00:00</ b:Modified At><b:Prio rity>High< /b:Priorit y><b:Prope rties><a:K eyValueOfs tringstrin g><a:Key>T itle</a:Ke y><a:Value >WebVRAM M ay be Subj ect to Ele vation of Privilege Using Remo te Code Ex ecution</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatCat egory</a:K ey><a:Valu e>Elevatio n Of Privi lege</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>A u ser subjec t gains in creased ca pability o r privileg e by takin g advantag e of an im plementati on bug.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>Brows er may be able to re motely exe cute code for WebVRA M.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Requ ests</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Priori ty</a:Key> <a:Value>H igh</a:Val ue></a:Key ValueOfstr ingstring> </b:Proper ties><b:So urceGuid>3 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a</b:S ourceGuid> <b:State>A utoGenerat ed</b:Stat e><b:State Informatio n i:nil="t rue"/><b:T argetGuid> d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: TargetGuid ><b:Title i:nil="tru e"/><b:Typ eId>E6</b: TypeId><b: Upgraded>f alse</b:Up graded><b: UserThreat Category i :nil="true "/><b:User ThreatDesc ription i: nil="true" /><b:UserT hreatShort Descriptio n i:nil="t rue"/><b:W ide>false< /b:Wide></ a:Value></ a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:Key>E7 322b3360-c f25-454c-a 328-a52ac3 b88c0acfed ae71-be4b- 4234-9a5b- aa018f5dd6 d9d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy i:n il="true"/ ><b:Drawin gSurfaceGu id>2307879 a-6671-439 b-a5af-995 71be4ea24< /b:Drawing SurfaceGui d><b:FlowG uid>cfedae 71-be4b-42 34-9a5b-aa 018f5dd6d9 </b:FlowGu id><b:Id>3 0</b:Id><b :Interacti onKey>322b 3360-cf25- 454c-a328- a52ac3b88c 0a:cfedae7 1-be4b-423 4-9a5b-aa0 18f5dd6d9: d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: Interactio nKey><b:In teractionS tring i:ni l="true"/> <b:Modifie dAt>0001-0 1-01T00:00 :00</b:Mod ifiedAt><b :Priority> High</b:Pr iority><b: Properties ><a:KeyVal ueOfstring string><a: Key>Title< /a:Key><a: Value>Elev ation by C hanging th e Executio n Flow in WebVRAM</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatCat egory</a:K ey><a:Valu e>Elevatio n Of Privi lege</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>A u ser subjec t gains in creased ca pability o r privileg e by takin g advantag e of an im plementati on bug.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>An at tacker may pass data into WebV RAM in ord er to chan ge the flo w of progr am executi on within WebVRAM to the attac ker's choo sing.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>R equests</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Pri ority</a:K ey><a:Valu e>High</a: Value></a: KeyValueOf stringstri ng></b:Pro perties><b :SourceGui d>322b3360 -cf25-454c -a328-a52a c3b88c0a</ b:SourceGu id><b:Stat e>AutoGene rated</b:S tate><b:St ateInforma tion i:nil ="true"/>< b:TargetGu id>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:TargetG uid><b:Tit le i:nil=" true"/><b: TypeId>E7< /b:TypeId> <b:Upgrade d>false</b :Upgraded> <b:UserThr eatCategor y i:nil="t rue"/><b:U serThreatD escription i:nil="tr ue"/><b:Us erThreatSh ortDescrip tion i:nil ="true"/>< b:Wide>fal se</b:Wide ></a:Value ></a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :KeyValueO fstringThr eatpc_P0_P hOB><a:Key >8404dcf5- bdd8-4902- abc2-3b6c9 67b0261322 b3360-cf25 -454c-a328 -a52ac3b88 c0acfedae7 1-be4b-423 4-9a5b-aa0 18f5dd6d9d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</a:K ey><a:Valu e xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Change dBy i:nil= "true"/><b :DrawingSu rfaceGuid> 2307879a-6 671-439b-a 5af-99571b e4ea24</b: DrawingSur faceGuid>< b:FlowGuid >cfedae71- be4b-4234- 9a5b-aa018 f5dd6d9</b :FlowGuid> <b:Id>31</ b:Id><b:In teractionK ey>322b336 0-cf25-454 c-a328-a52 ac3b88c0a: cfedae71-b e4b-4234-9 a5b-aa018f 5dd6d9:d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</b:Int eractionKe y><b:Inter actionStri ng i:nil=" true"/><b: ModifiedAt >0001-01-0 1T00:00:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Cross S ite Reques t Forgery< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatC ategory</a :Key><a:Va lue>Elevat ion Of Pri vilege</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatShor tDescripti on</a:Key> <a:Value>A user subj ect gains increased capability or privil ege by tak ing advant age of an implementa tion bug.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Cro ss-site re quest forg ery (CSRF or XSRF) i s a type o f attack i n which an attacker forces a u ser's brow ser to mak e a forged request t o a vulner able site by exploit ing an exi sting trus t relation ship betwe en the bro wser and t he vulnera ble web si te. In a simple sce nario, a u ser is log ged in to web site A using a c ookie as a credentia l. The ot her browse s to web s ite B. We b site B r eturns a p age with a hidden fo rm that po sts to web site A. Since the browser wi ll carry t he user's cookie to web site A , web site B now can take any action on web site A , for exam ple, addin g an admin to an acc ount. The attack ca n be used to exploit any reque sts that t he browser automatic ally authe nticates, e.g. by se ssion cook ie, integr ated authe ntication, IP whitel isting, †¦ The att ack can be carried o ut in many ways such as by lur ing the vi ctim to a site under control o f the atta cker, gett ing the us er to clic k a link i n a phishi ng email, or hacking a reputab le web sit e that the victim wi ll visit. The issue can only b e resolved on the se rver side by requiri ng that al l authenti cated stat e-changing requests include an additiona l piece of secret pa yload (can ary or CSR F token) w hich is kn own only t o the legi timate web site and the browse r and whic h is prote cted in tr ansit thro ugh SSL/TL S. See the Forgery P rotection property o n the flow stencil f or a list of mitigat ions.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>R equests</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Pri ority</a:K ey><a:Valu e>High</a: Value></a: KeyValueOf stringstri ng></b:Pro perties><b :SourceGui d>322b3360 -cf25-454c -a328-a52a c3b88c0a</ b:SourceGu id><b:Stat e>AutoGene rated</b:S tate><b:St ateInforma tion i:nil ="true"/>< b:TargetGu id>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:TargetG uid><b:Tit le i:nil=" true"/><b: TypeId>840 4dcf5-bdd8 -4902-abc2 -3b6c967b0 261</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>S8d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f575120d a-f6c6-45d 7-b62d-9f7 e242eaa543 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a</a:K ey><a:Valu e xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Change dBy i:nil= "true"/><b :DrawingSu rfaceGuid> 2307879a-6 671-439b-a 5af-99571b e4ea24</b: DrawingSur faceGuid>< b:FlowGuid >575120da- f6c6-45d7- b62d-9f7e2 42eaa54</b :FlowGuid> <b:Id>32</ b:Id><b:In teractionK ey>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f: 575120da-f 6c6-45d7-b 62d-9f7e24 2eaa54:322 b3360-cf25 -454c-a328 -a52ac3b88 c0a</b:Int eractionKe y><b:Inter actionStri ng i:nil=" true"/><b: ModifiedAt >0001-01-0 1T00:00:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Spoofin g of the B rowser Ext ernal Dest ination En tity</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatCatego ry</a:Key> <a:Value>S poofing</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatSho rtDescript ion</a:Key ><a:Value> Spoofing i s when a p rocess or entity is something other than its claim ed identit y. Example s include substituti ng a proce ss, a file , website or a netwo rk address .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tDescripti on</a:Key> <a:Value>B rowser may be spoofe d by an at tacker and this may lead to da ta being s ent to the attacker' s target i nstead of Browser. C onsider us ing a stan dard authe ntication mechanism to identif y the exte rnal entit y.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Resu lts</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Priorit y</a:Key>< a:Value>Hi gh</a:Valu e></a:KeyV alueOfstri ngstring>< /b:Propert ies><b:Sou rceGuid>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:So urceGuid>< b:State>Au toGenerate d</b:State ><b:StateI nformation i:nil="tr ue"/><b:Ta rgetGuid>3 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a</b:T argetGuid> <b:Title i :nil="true "/><b:Type Id>S8</b:T ypeId><b:U pgraded>fa lse</b:Upg raded><b:U serThreatC ategory i: nil="true" /><b:UserT hreatDescr iption i:n il="true"/ ><b:UserTh reatShortD escription i:nil="tr ue"/><b:Wi de>false</ b:Wide></a :Value></a :KeyValueO fstringThr eatpc_P0_P hOB><a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:Key>R7d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f57512 0da-f6c6-4 5d7-b62d-9 f7e242eaa5 4322b3360- cf25-454c- a328-a52ac 3b88c0a</a :Key><a:Va lue xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Chan gedBy i:ni l="true"/> <b:Drawing SurfaceGui d>2307879a -6671-439b -a5af-9957 1be4ea24</ b:DrawingS urfaceGuid ><b:FlowGu id>575120d a-f6c6-45d 7-b62d-9f7 e242eaa54< /b:FlowGui d><b:Id>33 </b:Id><b: Interactio nKey>d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f:575120da -f6c6-45d7 -b62d-9f7e 242eaa54:3 22b3360-cf 25-454c-a3 28-a52ac3b 88c0a</b:I nteraction Key><b:Int eractionSt ring i:nil ="true"/>< b:Modified At>0001-01 -01T00:00: 00</b:Modi fiedAt><b: Priority>H igh</b:Pri ority><b:P roperties> <a:KeyValu eOfstrings tring><a:K ey>Title</ a:Key><a:V alue>Exter nal Entity Browser P otentially Denies Re ceiving Da ta</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Rep udiation</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatSh ortDescrip tion</a:Ke y><a:Value >Repudiati on threats involve a n adversar y denying that somet hing happe ned.</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatDescri ption</a:K ey><a:Valu e>Browser claims tha t it did n ot receive data from a process on the ot her side o f the trus t boundary . Consider using log ging or au diting to record the source, t ime, and s ummary of the receiv ed data.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>In teractionS tring</a:K ey><a:Valu e>Results< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Source Guid><b:St ate>AutoGe nerated</b :State><b: StateInfor mation i:n il="true"/ ><b:Target Guid>322b3 360-cf25-4 54c-a328-a 52ac3b88c0 a</b:Targe tGuid><b:T itle i:nil ="true"/>< b:TypeId>R 7</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K ey>D4d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f575120da- f6c6-45d7- b62d-9f7e2 42eaa54322 b3360-cf25 -454c-a328 -a52ac3b88 c0a</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y i:nil="t rue"/><b:D rawingSurf aceGuid>23 07879a-667 1-439b-a5a f-99571be4 ea24</b:Dr awingSurfa ceGuid><b: FlowGuid>5 75120da-f6 c6-45d7-b6 2d-9f7e242 eaa54</b:F lowGuid><b :Id>34</b: Id><b:Inte ractionKey >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f:57 5120da-f6c 6-45d7-b62 d-9f7e242e aa54:322b3 360-cf25-4 54c-a328-a 52ac3b88c0 a</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>0 001-01-01T 00:00:00</ b:Modified At><b:Prio rity>High< /b:Priorit y><b:Prope rties><a:K eyValueOfs tringstrin g><a:Key>T itle</a:Ke y><a:Value >Data Flow Generic D ata Flow I s Potentia lly Interr upted</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatCateg ory</a:Key ><a:Value> Denial Of Service</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatSho rtDescript ion</a:Key ><a:Value> Denial of Service ha ppens when the proce ss or a da tastore is not able to service incoming requests o r perform up to spec .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tDescripti on</a:Key> <a:Value>A n external agent int errupts da ta flowing across a trust boun dary in ei ther direc tion.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>R esults</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Prio rity</a:Ke y><a:Value >High</a:V alue></a:K eyValueOfs tringstrin g></b:Prop erties><b: SourceGuid >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :SourceGui d><b:State >AutoGener ated</b:St ate><b:Sta teInformat ion i:nil= "true"/><b :TargetGui d>322b3360 -cf25-454c -a328-a52a c3b88c0a</ b:TargetGu id><b:Titl e i:nil="t rue"/><b:T ypeId>D4</ b:TypeId>< b:Upgraded >false</b: Upgraded>< b:UserThre atCategory i:nil="tr ue"/><b:Us erThreatDe scription i:nil="tru e"/><b:Use rThreatSho rtDescript ion i:nil= "true"/><b :Wide>fals e</b:Wide> </a:Value> </a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: KeyValueOf stringThre atpc_P0_Ph OB><a:Key> S8d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f50 6256b7-0f0 b-4407-82c d-4f728d1f 6a4d5ae6e1 e4-d1d8-43 06-9e99-88 96c7977524 </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>5062 56b7-0f0b- 4407-82cd- 4f728d1f6a 4d</b:Flow Guid><b:Id >35</b:Id> <b:Interac tionKey>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f:50625 6b7-0f0b-4 407-82cd-4 f728d1f6a4 d:5ae6e1e4 -d1d8-4306 -9e99-8896 c7977524</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>0001 -01-01T00: 00:00</b:M odifiedAt> <b:Priorit y>High</b: Priority>< b:Properti es><a:KeyV alueOfstri ngstring>< a:Key>Titl e</a:Key>< a:Value>Sp oofing of the Generi c External Interacto r External Destinati on Entity< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatC ategory</a :Key><a:Va lue>Spoofi ng</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atShortDes cription</ a:Key><a:V alue>Spoof ing is whe n a proces s or entit y is somet hing other than its claimed id entity. Ex amples inc lude subst ituting a process, a file, web site or a network ad dress.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatDesc ription</a :Key><a:Va lue>Attach mate Refle ction Appl ication ma y be spoof ed by an a ttacker an d this may lead to d ata being sent to th e attacker 's target instead of Attachmat e Reflecti on Applica tion. Cons ider using a standar d authenti cation mec hanism to identify t he externa l entity.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>I nteraction String</a: Key><a:Val ue>Claims- Provided V istA user credential s</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Priority< /a:Key><a: Value>High </a:Value> </a:KeyVal ueOfstring string></b :Propertie s><b:Sourc eGuid>d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</b:Sour ceGuid><b: State>Auto Generated< /b:State>< b:StateInf ormation i :nil="true "/><b:Targ etGuid>5ae 6e1e4-d1d8 -4306-9e99 -8896c7977 524</b:Tar getGuid><b :Title i:n il="true"/ ><b:TypeId >S8</b:Typ eId><b:Upg raded>fals e</b:Upgra ded><b:Use rThreatCat egory i:ni l="true"/> <b:UserThr eatDescrip tion i:nil ="true"/>< b:UserThre atShortDes cription i :nil="true "/><b:Wide >false</b: Wide></a:V alue></a:K eyValueOfs tringThrea tpc_P0_PhO B><a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :Key>R7d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f506256b 7-0f0b-440 7-82cd-4f7 28d1f6a4d5 ae6e1e4-d1 d8-4306-9e 99-8896c79 77524</a:K ey><a:Valu e xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Know ledgeBase" ><b:Change dBy i:nil= "true"/><b :DrawingSu rfaceGuid> 2307879a-6 671-439b-a 5af-99571b e4ea24</b: DrawingSur faceGuid>< b:FlowGuid >506256b7- 0f0b-4407- 82cd-4f728 d1f6a4d</b :FlowGuid> <b:Id>36</ b:Id><b:In teractionK ey>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f: 506256b7-0 f0b-4407-8 2cd-4f728d 1f6a4d:5ae 6e1e4-d1d8 -4306-9e99 -8896c7977 524</b:Int eractionKe y><b:Inter actionStri ng i:nil=" true"/><b: ModifiedAt >0001-01-0 1T00:00:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Externa l Entity G eneric Ext ernal Inte ractor Pot entially D enies Rece iving Data </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Category</ a:Key><a:V alue>Repud iation</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatShor tDescripti on</a:Key> <a:Value>R epudiation threats i nvolve an adversary denying th at somethi ng happene d.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atDescript ion</a:Key ><a:Value> Attachmate Reflectio n Applicat ion claims that it d id not rec eive data from a pro cess on th e other si de of the trust boun dary. Cons ider using logging o r auditing to record the sourc e, time, a nd summary of the re ceived dat a.</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Interact ionString< /a:Key><a: Value>Clai ms-Provide d VistA us er credent ials</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Priori ty</a:Key> <a:Value>H igh</a:Val ue></a:Key ValueOfstr ingstring> </b:Proper ties><b:So urceGuid>d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:S ourceGuid> <b:State>A utoGenerat ed</b:Stat e><b:State Informatio n i:nil="t rue"/><b:T argetGuid> 5ae6e1e4-d 1d8-4306-9 e99-8896c7 977524</b: TargetGuid ><b:Title i:nil="tru e"/><b:Typ eId>R7</b: TypeId><b: Upgraded>f alse</b:Up graded><b: UserThreat Category i :nil="true "/><b:User ThreatDesc ription i: nil="true" /><b:UserT hreatShort Descriptio n i:nil="t rue"/><b:W ide>false< /b:Wide></ a:Value></ a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke yValueOfst ringThreat pc_P0_PhOB ><a:Key>D4 d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f5062 56b7-0f0b- 4407-82cd- 4f728d1f6a 4d5ae6e1e4 -d1d8-4306 -9e99-8896 c7977524</ a:Key><a:V alue xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.K nowledgeBa se"><b:Cha ngedBy i:n il="true"/ ><b:Drawin gSurfaceGu id>2307879 a-6671-439 b-a5af-995 71be4ea24< /b:Drawing SurfaceGui d><b:FlowG uid>506256 b7-0f0b-44 07-82cd-4f 728d1f6a4d </b:FlowGu id><b:Id>3 7</b:Id><b :Interacti onKey>d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f:506256b 7-0f0b-440 7-82cd-4f7 28d1f6a4d: 5ae6e1e4-d 1d8-4306-9 e99-8896c7 977524</b: Interactio nKey><b:In teractionS tring i:ni l="true"/> <b:Modifie dAt>0001-0 1-01T00:00 :00</b:Mod ifiedAt><b :Priority> High</b:Pr iority><b: Properties ><a:KeyVal ueOfstring string><a: Key>Title< /a:Key><a: Value>Data Flow Gene ric Data F low Is Pot entially I nterrupted </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Category</ a:Key><a:V alue>Denia l Of Servi ce</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atShortDes cription</ a:Key><a:V alue>Denia l of Servi ce happens when the process or a datasto re is not able to se rvice inco ming reque sts or per form up to spec.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatDesc ription</a :Key><a:Va lue>An ext ernal agen t interrup ts data fl owing acro ss a trust boundary in either direction. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>Claims -Provided VistA user credentia ls</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Priority </a:Key><a :Value>Hig h</a:Value ></a:KeyVa lueOfstrin gstring></ b:Properti es><b:Sour ceGuid>d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</b:Sou rceGuid><b :State>Aut oGenerated </b:State> <b:StateIn formation i:nil="tru e"/><b:Tar getGuid>5a e6e1e4-d1d 8-4306-9e9 9-8896c797 7524</b:Ta rgetGuid>< b:Title i: nil="true" /><b:TypeI d>D4</b:Ty peId><b:Up graded>fal se</b:Upgr aded><b:Us erThreatCa tegory i:n il="true"/ ><b:UserTh reatDescri ption i:ni l="true"/> <b:UserThr eatShortDe scription i:nil="tru e"/><b:Wid e>false</b :Wide></a: Value></a: KeyValueOf stringThre atpc_P0_Ph OB><a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:Key>S257 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e0366ce a8-7279-40 5c-94e0-37 1fe09d9992 d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</a: Key><a:Val ue xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Chang edBy i:nil ="true"/>< b:DrawingS urfaceGuid >2307879a- 6671-439b- a5af-99571 be4ea24</b :DrawingSu rfaceGuid> <b:FlowGui d>0366cea8 -7279-405c -94e0-371f e09d9992</ b:FlowGuid ><b:Id>54< /b:Id><b:I nteraction Key>577bec 78-2ceb-4b 5f-81d8-fd f92cda3a2e :0366cea8- 7279-405c- 94e0-371fe 09d9992:d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:In teractionK ey><b:Inte ractionStr ing i:nil= "true"/><b :ModifiedA t>0001-01- 01T00:00:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Spoofi ng the Web VRAM Proce ss</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atCategory </a:Key><a :Value>Spo ofing</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>Sp oofing is when a pro cess or en tity is so mething ot her than i ts claimed identity. Examples include su bstituting a process , a file, website or a network address.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Web VRAM may b e spoofed by an atta cker and t his may le ad to info rmation di sclosure b y VistA (C laims Inst ance). Con sider usin g a standa rd authent ication me chanism to identify the destin ation proc ess.</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Intera ctionStrin g</a:Key>< a:Value>Cl aims-Provi ded VistA user crede ntials</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Prio rity</a:Ke y><a:Value >High</a:V alue></a:K eyValueOfs tringstrin g></b:Prop erties><b: SourceGuid >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e</b :SourceGui d><b:State >AutoGener ated</b:St ate><b:Sta teInformat ion i:nil= "true"/><b :TargetGui d>d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:TargetGu id><b:Titl e i:nil="t rue"/><b:T ypeId>S2</ b:TypeId>< b:Upgraded >false</b: Upgraded>< b:UserThre atCategory i:nil="tr ue"/><b:Us erThreatDe scription i:nil="tru e"/><b:Use rThreatSho rtDescript ion i:nil= "true"/><b :Wide>fals e</b:Wide> </a:Value> </a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: KeyValueOf stringThre atpc_P0_Ph OB><a:Key> S3577bec78 -2ceb-4b5f -81d8-fdf9 2cda3a2e03 66cea8-727 9-405c-94e 0-371fe09d 9992d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>0366 cea8-7279- 405c-94e0- 371fe09d99 92</b:Flow Guid><b:Id >55</b:Id> <b:Interac tionKey>57 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e:0366c ea8-7279-4 05c-94e0-3 71fe09d999 2:d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>0001 -01-01T00: 00:00</b:M odifiedAt> <b:Priorit y>High</b: Priority>< b:Properti es><a:KeyV alueOfstri ngstring>< a:Key>Titl e</a:Key>< a:Value>Sp oofing the Claims Vi stA system External Entity</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatCate gory</a:Ke y><a:Value >Spoofing< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatS hortDescri ption</a:K ey><a:Valu e>Spoofing is when a process o r entity i s somethin g other th an its cla imed ident ity. Examp les includ e substitu ting a pro cess, a fi le, websit e or a net work addre ss.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatDescrip tion</a:Ke y><a:Value >VistA (Cl aims Insta nce) may b e spoofed by an atta cker and t his may le ad to unau thorized a ccess to W ebVRAM. Co nsider usi ng a stand ard authen tication m echanism t o identify the exter nal entity .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >Interacti onString</ a:Key><a:V alue>Claim s-Provided VistA use r credenti als</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Priorit y</a:Key>< a:Value>Hi gh</a:Valu e></a:KeyV alueOfstri ngstring>< /b:Propert ies><b:Sou rceGuid>57 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e</b:So urceGuid>< b:State>Au toGenerate d</b:State ><b:StateI nformation i:nil="tr ue"/><b:Ta rgetGuid>d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:T argetGuid> <b:Title i :nil="true "/><b:Type Id>S3</b:T ypeId><b:U pgraded>fa lse</b:Upg raded><b:U serThreatC ategory i: nil="true" /><b:UserT hreatDescr iption i:n il="true"/ ><b:UserTh reatShortD escription i:nil="tr ue"/><b:Wi de>false</ b:Wide></a :Value></a :KeyValueO fstringThr eatpc_P0_P hOB><a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:Key>T15 77bec78-2c eb-4b5f-81 d8-fdf92cd a3a2e0366c ea8-7279-4 05c-94e0-3 71fe09d999 2d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</a :Key><a:Va lue xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e"><b:Chan gedBy i:ni l="true"/> <b:Drawing SurfaceGui d>2307879a -6671-439b -a5af-9957 1be4ea24</ b:DrawingS urfaceGuid ><b:FlowGu id>0366cea 8-7279-405 c-94e0-371 fe09d9992< /b:FlowGui d><b:Id>56 </b:Id><b: Interactio nKey>577be c78-2ceb-4 b5f-81d8-f df92cda3a2 e:0366cea8 -7279-405c -94e0-371f e09d9992:d 7a04a7c-7a db-4871-95 dd-5dc91f5 6e26f</b:I nteraction Key><b:Int eractionSt ring i:nil ="true"/>< b:Modified At>0001-01 -01T00:00: 00</b:Modi fiedAt><b: Priority>H igh</b:Pri ority><b:P roperties> <a:KeyValu eOfstrings tring><a:K ey>Title</ a:Key><a:V alue>Poten tial Lack of Input V alidation for WebVRA M</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Tamp ering</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatShort Descriptio n</a:Key>< a:Value>Ta mpering is the act o f altering the bits. Tampering with a pr ocess invo lves chang ing bits i n the runn ing proces s. Similar ly, Tamper ing with a data flow involves changing b its on the wire or b etween two running p rocesses.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Dat a flowing across Cla ims-Provid ed VistA u ser creden tials may be tampere d with by an attacke r. This ma y lead to a denial o f service attack aga inst WebVR AM or an e levation o f privileg e attack a gainst Web VRAM or an informati on disclos ure by Web VRAM. Fail ure to ver ify that i nput is as expected is a root cause of a very larg e number o f exploita ble issues . Consider all paths and the w ay they ha ndle data. Verify th at all inp ut is veri fied for c orrectness using an approved l ist input validation approach. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>Claims -Provided VistA user credentia ls</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Priority </a:Key><a :Value>Hig h</a:Value ></a:KeyVa lueOfstrin gstring></ b:Properti es><b:Sour ceGuid>577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e</b:Sou rceGuid><b :State>Aut oGenerated </b:State> <b:StateIn formation i:nil="tru e"/><b:Tar getGuid>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:Ta rgetGuid>< b:Title i: nil="true" /><b:TypeI d>T1</b:Ty peId><b:Up graded>fal se</b:Upgr aded><b:Us erThreatCa tegory i:n il="true"/ ><b:UserTh reatDescri ption i:ni l="true"/> <b:UserThr eatShortDe scription i:nil="tru e"/><b:Wid e>false</b :Wide></a: Value></a: KeyValueOf stringThre atpc_P0_Ph OB><a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:Key>T13. 1577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e036 6cea8-7279 -405c-94e0 -371fe09d9 992d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /a:Key><a: Value xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Ch angedBy>VH A21\DNS</b :ChangedBy ><b:Drawin gSurfaceGu id>2307879 a-6671-439 b-a5af-995 71be4ea24< /b:Drawing SurfaceGui d><b:FlowG uid>0366ce a8-7279-40 5c-94e0-37 1fe09d9992 </b:FlowGu id><b:Id>5 7</b:Id><b :Interacti onKey>577b ec78-2ceb- 4b5f-81d8- fdf92cda3a 2e:0366cea 8-7279-405 c-94e0-371 fe09d9992: d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</b: Interactio nKey><b:In teractionS tring i:ni l="true"/> <b:Modifie dAt>2017-0 6-14T07:34 :33.742986 1-10:00</b :ModifiedA t><b:Prior ity>High</ b:Priority ><b:Proper ties><a:Ke yValueOfst ringstring ><a:Key>Ti tle</a:Key ><a:Value> Cross Site Scripting </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Category</ a:Key><a:V alue>Tampe ring</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>Tam pering is the act of altering the bits. Tampering with a pro cess invol ves changi ng bits in the runni ng process . Similarl y, Tamperi ng with a data flow involves c hanging bi ts on the wire or be tween two running pr ocesses.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatDe scription< /a:Key><a: Value>The web server 'WebVRAM' could be a subject to a cross -site scri pting atta ck because it does n ot sanitiz e untruste d input.</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>St ateInforma tion</a:Ke y><a:Value >All input is saniti zed.</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Intera ctionStrin g</a:Key>< a:Value>Cl aims-Provi ded VistA user crede ntials</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Prio rity</a:Ke y><a:Value >High</a:V alue></a:K eyValueOfs tringstrin g></b:Prop erties><b: SourceGuid >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e</b :SourceGui d><b:State >Mitigated </b:State> <b:StateIn formation i:nil="tru e"/><b:Tar getGuid>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:Ta rgetGuid>< b:Title i: nil="true" /><b:TypeI d>T13.1</b :TypeId><b :Upgraded> false</b:U pgraded><b :UserThrea tCategory i:nil="tru e"/><b:Use rThreatDes cription i :nil="true "/><b:User ThreatShor tDescripti on i:nil=" true"/><b: Wide>false </b:Wide>< /a:Value>< /a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K eyValueOfs tringThrea tpc_P0_PhO B><a:Key>R 6577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e036 6cea8-7279 -405c-94e0 -371fe09d9 992d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /a:Key><a: Value xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"><b:Ch angedBy i: nil="true" /><b:Drawi ngSurfaceG uid>230787 9a-6671-43 9b-a5af-99 571be4ea24 </b:Drawin gSurfaceGu id><b:Flow Guid>0366c ea8-7279-4 05c-94e0-3 71fe09d999 2</b:FlowG uid><b:Id> 58</b:Id>< b:Interact ionKey>577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e:0366ce a8-7279-40 5c-94e0-37 1fe09d9992 :d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :Interacti onKey><b:I nteraction String i:n il="true"/ ><b:Modifi edAt>0001- 01-01T00:0 0:00</b:Mo difiedAt>< b:Priority >High</b:P riority><b :Propertie s><a:KeyVa lueOfstrin gstring><a :Key>Title </a:Key><a :Value>Pot ential Dat a Repudiat ion by Web VRAM</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatCatego ry</a:Key> <a:Value>R epudiation </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat ShortDescr iption</a: Key><a:Val ue>Repudia tion threa ts involve an advers ary denyin g that som ething hap pened.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatDesc ription</a :Key><a:Va lue>WebVRA M claims t hat it did not recei ve data fr om a sourc e outside the trust boundary. Consider u sing loggi ng or audi ting to re cord the s ource, tim e, and sum mary of th e received data.</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Inte ractionStr ing</a:Key ><a:Value> Claims-Pro vided Vist A user cre dentials</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Pr iority</a: Key><a:Val ue>High</a :Value></a :KeyValueO fstringstr ing></b:Pr operties>< b:SourceGu id>577bec7 8-2ceb-4b5 f-81d8-fdf 92cda3a2e< /b:SourceG uid><b:Sta te>AutoGen erated</b: State><b:S tateInform ation i:ni l="true"/> <b:TargetG uid>d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Target Guid><b:Ti tle i:nil= "true"/><b :TypeId>R6 </b:TypeId ><b:Upgrad ed>false</ b:Upgraded ><b:UserTh reatCatego ry i:nil=" true"/><b: UserThreat Descriptio n i:nil="t rue"/><b:U serThreatS hortDescri ption i:ni l="true"/> <b:Wide>fa lse</b:Wid e></a:Valu e></a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke y>I6577bec 78-2ceb-4b 5f-81d8-fd f92cda3a2e 0366cea8-7 279-405c-9 4e0-371fe0 9d9992d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</a:Key> <a:Value x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :ChangedBy >VHA21\DNS </b:Change dBy><b:Dra wingSurfac eGuid>2307 879a-6671- 439b-a5af- 99571be4ea 24</b:Draw ingSurface Guid><b:Fl owGuid>036 6cea8-7279 -405c-94e0 -371fe09d9 992</b:Flo wGuid><b:I d>59</b:Id ><b:Intera ctionKey>5 77bec78-2c eb-4b5f-81 d8-fdf92cd a3a2e:0366 cea8-7279- 405c-94e0- 371fe09d99 92:d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:Interac tionKey><b :Interacti onString i :nil="true "/><b:Modi fiedAt>201 7-06-14T07 :24:30.019 9861-10:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>Data Fl ow Sniffin g</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Info rmation Di sclosure</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatSh ortDescrip tion</a:Ke y><a:Value >Informati on disclos ure happen s when the informati on can be read by an unauthori zed party. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> UserThreat Descriptio n</a:Key>< a:Value>Da ta flowing across Cl aims-Provi ded VistA user crede ntials may be sniffe d by an at tacker. De pending on what type of data a n attacker can read, it may be used to a ttack othe r parts of the syste m or simpl y be a dis closure of informati on leading to compli ance viola tions. Con sider encr ypting the data flow .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >StateInfo rmation</a :Key><a:Va lue>This i ssue is va lid howeve r VA does not have a solution to mitigat e this thr eat.</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>Intera ctionStrin g</a:Key>< a:Value>Cl aims-Provi ded VistA user crede ntials</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>Prio rity</a:Ke y><a:Value >High</a:V alue></a:K eyValueOfs tringstrin g></b:Prop erties><b: SourceGuid >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e</b :SourceGui d><b:State >NotApplic able</b:St ate><b:Sta teInformat ion i:nil= "true"/><b :TargetGui d>d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:TargetGu id><b:Titl e i:nil="t rue"/><b:T ypeId>I6</ b:TypeId>< b:Upgraded >false</b: Upgraded>< b:UserThre atCategory i:nil="tr ue"/><b:Us erThreatDe scription i:nil="tru e"/><b:Use rThreatSho rtDescript ion i:nil= "true"/><b :Wide>fals e</b:Wide> </a:Value> </a:KeyVal ueOfstring Threatpc_P 0_PhOB><a: KeyValueOf stringThre atpc_P0_Ph OB><a:Key> D3577bec78 -2ceb-4b5f -81d8-fdf9 2cda3a2e03 66cea8-727 9-405c-94e 0-371fe09d 9992d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </a:Key><a :Value xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Knowledge Base"><b:C hangedBy i :nil="true "/><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>0366 cea8-7279- 405c-94e0- 371fe09d99 92</b:Flow Guid><b:Id >60</b:Id> <b:Interac tionKey>57 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e:0366c ea8-7279-4 05c-94e0-3 71fe09d999 2:d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>0001 -01-01T00: 00:00</b:M odifiedAt> <b:Priorit y>High</b: Priority>< b:Properti es><a:KeyV alueOfstri ngstring>< a:Key>Titl e</a:Key>< a:Value>Po tential Pr ocess Cras h or Stop for WebVRA M</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Deni al Of Serv ice</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>UserThr eatShortDe scription< /a:Key><a: Value>Deni al of Serv ice happen s when the process o r a datast ore is not able to s ervice inc oming requ ests or pe rform up t o spec.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>WebVR AM crashes , halts, s tops or ru ns slowly; in all ca ses violat ing an ava ilability metric.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Int eractionSt ring</a:Ke y><a:Value >Claims-Pr ovided Vis tA user cr edentials< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>P riority</a :Key><a:Va lue>High</ a:Value></ a:KeyValue Ofstringst ring></b:P roperties> <b:SourceG uid>577bec 78-2ceb-4b 5f-81d8-fd f92cda3a2e </b:Source Guid><b:St ate>AutoGe nerated</b :State><b: StateInfor mation i:n il="true"/ ><b:Target Guid>d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Targe tGuid><b:T itle i:nil ="true"/>< b:TypeId>D 3</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> <a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K ey>D4577be c78-2ceb-4 b5f-81d8-f df92cda3a2 e0366cea8- 7279-405c- 94e0-371fe 09d9992d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y i:nil="t rue"/><b:D rawingSurf aceGuid>23 07879a-667 1-439b-a5a f-99571be4 ea24</b:Dr awingSurfa ceGuid><b: FlowGuid>0 366cea8-72 79-405c-94 e0-371fe09 d9992</b:F lowGuid><b :Id>61</b: Id><b:Inte ractionKey >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e:03 66cea8-727 9-405c-94e 0-371fe09d 9992:d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>0 001-01-01T 00:00:00</ b:Modified At><b:Prio rity>High< /b:Priorit y><b:Prope rties><a:K eyValueOfs tringstrin g><a:Key>T itle</a:Ke y><a:Value >Data Flow Generic D ata Flow I s Potentia lly Interr upted</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatCateg ory</a:Key ><a:Value> Denial Of Service</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatSho rtDescript ion</a:Key ><a:Value> Denial of Service ha ppens when the proce ss or a da tastore is not able to service incoming requests o r perform up to spec .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tDescripti on</a:Key> <a:Value>A n external agent int errupts da ta flowing across a trust boun dary in ei ther direc tion.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Inter actionStri ng</a:Key> <a:Value>C laims-Prov ided VistA user cred entials</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Pri ority</a:K ey><a:Valu e>High</a: Value></a: KeyValueOf stringstri ng></b:Pro perties><b :SourceGui d>577bec78 -2ceb-4b5f -81d8-fdf9 2cda3a2e</ b:SourceGu id><b:Stat e>AutoGene rated</b:S tate><b:St ateInforma tion i:nil ="true"/>< b:TargetGu id>d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:TargetG uid><b:Tit le i:nil=" true"/><b: TypeId>D4< /b:TypeId> <b:Upgrade d>false</b :Upgraded> <b:UserThr eatCategor y i:nil="t rue"/><b:U serThreatD escription i:nil="tr ue"/><b:Us erThreatSh ortDescrip tion i:nil ="true"/>< b:Wide>fal se</b:Wide ></a:Value ></a:KeyVa lueOfstrin gThreatpc_ P0_PhOB><a :KeyValueO fstringThr eatpc_P0_P hOB><a:Key >E5577bec7 8-2ceb-4b5 f-81d8-fdf 92cda3a2e0 366cea8-72 79-405c-94 e0-371fe09 d9992d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</a:Key>< a:Value xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Knowledg eBase"><b: ChangedBy> VHA21\DNS< /b:Changed By><b:Draw ingSurface Guid>23078 79a-6671-4 39b-a5af-9 9571be4ea2 4</b:Drawi ngSurfaceG uid><b:Flo wGuid>0366 cea8-7279- 405c-94e0- 371fe09d99 92</b:Flow Guid><b:Id >62</b:Id> <b:Interac tionKey>57 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e:0366c ea8-7279-4 05c-94e0-3 71fe09d999 2:d7a04a7c -7adb-4871 -95dd-5dc9 1f56e26f</ b:Interact ionKey><b: Interactio nString i: nil="true" /><b:Modif iedAt>2017 -06-14T07: 22:29.0965 603-10:00< /b:Modifie dAt><b:Pri ority>High </b:Priori ty><b:Prop erties><a: KeyValueOf stringstri ng><a:Key> Title</a:K ey><a:Valu e>Elevatio n Using Im personatio n</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tCategory< /a:Key><a: Value>Elev ation Of P rivilege</ a:Value></ a:KeyValue Ofstringst ring><a:Ke yValueOfst ringstring ><a:Key>Us erThreatSh ortDescrip tion</a:Ke y><a:Value >A user su bject gain s increase d capabili ty or priv ilege by t aking adva ntage of a n implemen tation bug .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >UserThrea tDescripti on</a:Key> <a:Value>W ebVRAM may be able t o imperson ate the co ntext of V istA (Clai ms Instanc e) in orde r to gain additional privilege .</a:Value ></a:KeyVa lueOfstrin gstring><a :KeyValueO fstringstr ing><a:Key >StateInfo rmation</a :Key><a:Va lue>You ca nnot imper sonate a V istA user over the R PC broker. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>Claims -Provided VistA user credentia ls</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Priority </a:Key><a :Value>Hig h</a:Value ></a:KeyVa lueOfstrin gstring></ b:Properti es><b:Sour ceGuid>577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e</b:Sou rceGuid><b :State>Mit igated</b: State><b:S tateInform ation i:ni l="true"/> <b:TargetG uid>d7a04a 7c-7adb-48 71-95dd-5d c91f56e26f </b:Target Guid><b:Ti tle i:nil= "true"/><b :TypeId>E5 </b:TypeId ><b:Upgrad ed>false</ b:Upgraded ><b:UserTh reatCatego ry i:nil=" true"/><b: UserThreat Descriptio n i:nil="t rue"/><b:U serThreatS hortDescri ption i:ni l="true"/> <b:Wide>fa lse</b:Wid e></a:Valu e></a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:KeyValue OfstringTh reatpc_P0_ PhOB><a:Ke y>E6577bec 78-2ceb-4b 5f-81d8-fd f92cda3a2e 0366cea8-7 279-405c-9 4e0-371fe0 9d9992d7a0 4a7c-7adb- 4871-95dd- 5dc91f56e2 6f</a:Key> <a:Value x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Knowled geBase"><b :ChangedBy >VHA21\DNS </b:Change dBy><b:Dra wingSurfac eGuid>2307 879a-6671- 439b-a5af- 99571be4ea 24</b:Draw ingSurface Guid><b:Fl owGuid>036 6cea8-7279 -405c-94e0 -371fe09d9 992</b:Flo wGuid><b:I d>63</b:Id ><b:Intera ctionKey>5 77bec78-2c eb-4b5f-81 d8-fdf92cd a3a2e:0366 cea8-7279- 405c-94e0- 371fe09d99 92:d7a04a7 c-7adb-487 1-95dd-5dc 91f56e26f< /b:Interac tionKey><b :Interacti onString i :nil="true "/><b:Modi fiedAt>201 7-06-14T07 :33:26.207 9861-10:00 </b:Modifi edAt><b:Pr iority>Hig h</b:Prior ity><b:Pro perties><a :KeyValueO fstringstr ing><a:Key >Title</a: Key><a:Val ue>WebVRAM May be Su bject to E levation o f Privileg e Using Re mote Code Execution< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatC ategory</a :Key><a:Va lue>Elevat ion Of Pri vilege</a: Value></a: KeyValueOf stringstri ng><a:KeyV alueOfstri ngstring>< a:Key>User ThreatShor tDescripti on</a:Key> <a:Value>A user subj ect gains increased capability or privil ege by tak ing advant age of an implementa tion bug.< /a:Value>< /a:KeyValu eOfstrings tring><a:K eyValueOfs tringstrin g><a:Key>U serThreatD escription </a:Key><a :Value>Vis tA (Claims Instance) may be ab le to remo tely execu te code fo r WebVRAM. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> StateInfor mation</a: Key><a:Val ue>VistA c ontrols wh ich code c an be exec uted. WebV RAM merely askes Vis tA to exec ute code, if allowed then it'l l execute. </a:Value> </a:KeyVal ueOfstring string><a: KeyValueOf stringstri ng><a:Key> Interactio nString</a :Key><a:Va lue>Claims -Provided VistA user credentia ls</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>Priority </a:Key><a :Value>Hig h</a:Value ></a:KeyVa lueOfstrin gstring></ b:Properti es><b:Sour ceGuid>577 bec78-2ceb -4b5f-81d8 -fdf92cda3 a2e</b:Sou rceGuid><b :State>Not Applicable </b:State> <b:StateIn formation i:nil="tru e"/><b:Tar getGuid>d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:Ta rgetGuid>< b:Title i: nil="true" /><b:TypeI d>E6</b:Ty peId><b:Up graded>fal se</b:Upgr aded><b:Us erThreatCa tegory i:n il="true"/ ><b:UserTh reatDescri ption i:ni l="true"/> <b:UserThr eatShortDe scription i:nil="tru e"/><b:Wid e>false</b :Wide></a: Value></a: KeyValueOf stringThre atpc_P0_Ph OB><a:KeyV alueOfstri ngThreatpc _P0_PhOB>< a:Key>E757 7bec78-2ce b-4b5f-81d 8-fdf92cda 3a2e0366ce a8-7279-40 5c-94e0-37 1fe09d9992 d7a04a7c-7 adb-4871-9 5dd-5dc91f 56e26f</a: Key><a:Val ue xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Kno wledgeBase "><b:Chang edBy i:nil ="true"/>< b:DrawingS urfaceGuid >2307879a- 6671-439b- a5af-99571 be4ea24</b :DrawingSu rfaceGuid> <b:FlowGui d>0366cea8 -7279-405c -94e0-371f e09d9992</ b:FlowGuid ><b:Id>64< /b:Id><b:I nteraction Key>577bec 78-2ceb-4b 5f-81d8-fd f92cda3a2e :0366cea8- 7279-405c- 94e0-371fe 09d9992:d7 a04a7c-7ad b-4871-95d d-5dc91f56 e26f</b:In teractionK ey><b:Inte ractionStr ing i:nil= "true"/><b :ModifiedA t>0001-01- 01T00:00:0 0</b:Modif iedAt><b:P riority>Hi gh</b:Prio rity><b:Pr operties>< a:KeyValue Ofstringst ring><a:Ke y>Title</a :Key><a:Va lue>Elevat ion by Cha nging the Execution Flow in We bVRAM</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatCateg ory</a:Key ><a:Value> Elevation Of Privile ge</a:Valu e></a:KeyV alueOfstri ngstring>< a:KeyValue Ofstringst ring><a:Ke y>UserThre atShortDes cription</ a:Key><a:V alue>A use r subject gains incr eased capa bility or privilege by taking advantage of an impl ementation bug.</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>UserT hreatDescr iption</a: Key><a:Val ue>An atta cker may p ass data i nto WebVRA M in order to change the flow of program execution within We bVRAM to t he attacke r's choosi ng.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Interac tionString </a:Key><a :Value>Cla ims-Provid ed VistA u ser creden tials</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> 577bec78-2 ceb-4b5f-8 1d8-fdf92c da3a2e</b: SourceGuid ><b:State> AutoGenera ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>E7</b :TypeId><b :Upgraded> false</b:U pgraded><b :UserThrea tCategory i:nil="tru e"/><b:Use rThreatDes cription i :nil="true "/><b:User ThreatShor tDescripti on i:nil=" true"/><b: Wide>false </b:Wide>< /a:Value>< /a:KeyValu eOfstringT hreatpc_P0 _PhOB><a:K eyValueOfs tringThrea tpc_P0_PhO B><a:Key>8 404dcf5-bd d8-4902-ab c2-3b6c967 b0261577be c78-2ceb-4 b5f-81d8-f df92cda3a2 e0366cea8- 7279-405c- 94e0-371fe 09d9992d7a 04a7c-7adb -4871-95dd -5dc91f56e 26f</a:Key ><a:Value xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Knowle dgeBase">< b:ChangedB y i:nil="t rue"/><b:D rawingSurf aceGuid>23 07879a-667 1-439b-a5a f-99571be4 ea24</b:Dr awingSurfa ceGuid><b: FlowGuid>0 366cea8-72 79-405c-94 e0-371fe09 d9992</b:F lowGuid><b :Id>65</b: Id><b:Inte ractionKey >577bec78- 2ceb-4b5f- 81d8-fdf92 cda3a2e:03 66cea8-727 9-405c-94e 0-371fe09d 9992:d7a04 a7c-7adb-4 871-95dd-5 dc91f56e26 f</b:Inter actionKey> <b:Interac tionString i:nil="tr ue"/><b:Mo difiedAt>0 001-01-01T 00:00:00</ b:Modified At><b:Prio rity>High< /b:Priorit y><b:Prope rties><a:K eyValueOfs tringstrin g><a:Key>T itle</a:Ke y><a:Value >Cross Sit e Request Forgery</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatCat egory</a:K ey><a:Valu e>Elevatio n Of Privi lege</a:Va lue></a:Ke yValueOfst ringstring ><a:KeyVal ueOfstring string><a: Key>UserTh reatShortD escription </a:Key><a :Value>A u ser subjec t gains in creased ca pability o r privileg e by takin g advantag e of an im plementati on bug.</a :Value></a :KeyValueO fstringstr ing><a:Key ValueOfstr ingstring> <a:Key>Use rThreatDes cription</ a:Key><a:V alue>Cross -site requ est forger y (CSRF or XSRF) is a type of attack in which an a ttacker fo rces a use r's browse r to make a forged r equest to a vulnerab le site by exploitin g an exist ing trust relationsh ip between the brows er and the vulnerabl e web site . In a si mple scena rio, a use r is logge d in to we b site A u sing a coo kie as a c redential. The othe r browses to web sit e B. Web site B ret urns a pag e with a h idden form that post s to web s ite A. Si nce the br owser will carry the user's co okie to we b site A, web site B now can t ake any ac tion on we b site A, for exampl e, adding an admin t o an accou nt. The a ttack can be used to exploit a ny request s that the browser a utomatical ly authent icates, e. g. by sess ion cookie , integrat ed authent ication, I P whitelis ting, … The attac k can be c arried out in many w ays such a s by lurin g the vict im to a si te under c ontrol of the attack er, gettin g the user to click a link in a phishing email, or hacking a reputable web site that the v ictim will visit. Th e issue ca n only be resolved o n the serv er side by requiring that all authentica ted state- changing r equests in clude an a dditional piece of s ecret payl oad (canar y or CSRF token) whi ch is know n only to the legiti mate web s ite and th e browser and which is protect ed in tran sit throug h SSL/TLS. See the F orgery Pro tection pr operty on the flow s tencil for a list of mitigatio ns.</a:Val ue></a:Key ValueOfstr ingstring> <a:KeyValu eOfstrings tring><a:K ey>Interac tionString </a:Key><a :Value>Cla ims-Provid ed VistA u ser creden tials</a:V alue></a:K eyValueOfs tringstrin g><a:KeyVa lueOfstrin gstring><a :Key>Prior ity</a:Key ><a:Value> High</a:Va lue></a:Ke yValueOfst ringstring ></b:Prope rties><b:S ourceGuid> 577bec78-2 ceb-4b5f-8 1d8-fdf92c da3a2e</b: SourceGuid ><b:State> AutoGenera ted</b:Sta te><b:Stat eInformati on i:nil=" true"/><b: TargetGuid >d7a04a7c- 7adb-4871- 95dd-5dc91 f56e26f</b :TargetGui d><b:Title i:nil="tr ue"/><b:Ty peId>8404d cf5-bdd8-4 902-abc2-3 b6c967b026 1</b:TypeI d><b:Upgra ded>false< /b:Upgrade d><b:UserT hreatCateg ory i:nil= "true"/><b :UserThrea tDescripti on i:nil=" true"/><b: UserThreat ShortDescr iption i:n il="true"/ ><b:Wide>f alse</b:Wi de></a:Val ue></a:Key ValueOfstr ingThreatp c_P0_PhOB> </ThreatIn stances><T hreatGener ationEnabl ed>true</T hreatGener ationEnabl ed><Valida tions xmln s:a="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. KnowledgeB ase"/><Ver sion>4.3</ Version><K nowledgeBa se z:Id="i 22" xmlns: a="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Kn owledgeBas e" xmlns:z ="http://s chemas.mic rosoft.com /2003/10/S erializati on/"><a:Ge nericEleme nts><a:Ele mentType>< a:IsExtens ion>false< /a:IsExten sion><a:At tributes>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>Not Sele cted</b:Va lue><b:Val ue>Managed </b:Value> <b:Value>U nmanaged</ b:Value></ a:Attribut eValues><a :DisplayNa me>Code Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>co deType</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Not Sel ected</b:V alue><b:Va lue>Kernel </b:Value> <b:Value>S ystem</b:V alue><b:Va lue>Networ k Service< /b:Value>< b:Value>Lo cal Servic e</b:Value ><b:Value> Administra tor</b:Val ue><b:Valu e>Standard User With Elevation </b:Value> <b:Value>S tandard Us er Without Elevation </b:Value> <b:Value>W indows Sto re App</b: Value></a: AttributeV alues><a:D isplayName >Running A s</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>run ningAs</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Not Sel ected</b:V alue><b:Va lue>AppCon tainer</b: Value><b:V alue>Low I ntegrity L evel</b:Va lue><b:Val ue>Microso ft Office Isolated C onversion Environmen t (MOICE)< /b:Value>< b:Value>Sa ndbox</b:V alue></a:A ttributeVa lues><a:Di splayName> Isolation Level</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >Isolation </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>Not Selected< /b:Value>< b:Value>An y Remote U ser or Ent ity</b:Val ue><b:Valu e>Kernel, System, or Local Adm in</b:Valu e><b:Value >Local or Network Se rvice</b:V alue><b:Va lue>Local Standard U ser With E levation</ b:Value><b :Value>Loc al Standar d User Wit hout Eleva tion</b:Va lue><b:Val ue>Windows Store App s or App C ontainer P rocesses</ b:Value><b :Value>Not hing</b:Va lue><b:Val ue>Other</ b:Value></ a:Attribut eValues><a :DisplayNa me>Accepts Input Fro m</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>acc eptsInputF rom</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> No</b:Valu e><b:Value >Yes</b:Va lue></a:At tributeVal ues><a:Dis playName>I mplements or Uses an Authentic ation Mech anism</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >implement sAuthentic ationSchem e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute><a:At tribute><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributeValu es xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Int erfaces">< b:Value>No </b:Value> <b:Value>Y es</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Imp lements or Uses an A uthorizati on Mechani sm</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>im plementsCu stomAuthor izationMec hanism</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>No</b:V alue><b:Va lue>Yes</b :Value></a :Attribute Values><a: DisplayNam e>Implemen ts or Uses a Communi cation Pro tocol</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >implement sCommunica tionProtoc ol</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N ot Selecte d</b:Value ><b:Value> Yes</b:Val ue><b:Valu e>No</b:Va lue></a:At tributeVal ues><a:Dis playName>S anitizes I nput</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Dyna mic</a:Mod e><a:Name> hasInputSa nitizers</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Not S elected</b :Value><b: Value>Yes< /b:Value>< b:Value>No </b:Value> </a:Attrib uteValues> <a:Display Name>Sanit izes Outpu t</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>has OutputSani tizers</a: Name><a:Ty pe>List</a :Type></a: Attribute> </a:Attrib utes><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption>A re presentati on of a ge neric proc ess.</a:De scription> <a:Hidden> false</a:H idden><a:I d>GE.P</a: Id><a:Imag eLocation> Centered o n stencil< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA BGdBTUEAAL GOfPtRkwAA ACBjSFJNAA CHDwAAjA8A AP1SAACBQA AAfXkAAOmL AAA85QAAGc xzPIV3AAAK OWlDQ1BQaG 90b3Nob3Ag SUNDIHByb2 ZpbGUAAEjH nZZ3VFTXFo fPvXd6oc0w AlKG3rvAAN J7k15FYZgZ YCgDDjM0sS GiAhFFRJoi SFDEgNFQJF ZEsRAUVLAH JAgoMRhFVC xvRtaLrqy8 9/Ly++Osb+ 2z97n77L3P WhcAkqcvl5 cGSwGQyhPw gzyc6RGRUX TsAIABHmCA KQBMVka6X7 B7CBDJy82F niFyAl8EAf B6WLwCcNPQ M4BOB/+fpF npfIHomAAR m7M5GSwRF4 g4JUuQLrbP ipgalyxmGC VmvihBEcuJ OWGRDT77LL KjmNmpPLaI xTmns1PZYu 4V8bZMIUfE iK+ICzO5nC wR3xKxRoow lSviN+LYVA 4zAwAUSWwX cFiJIjYRMY kfEuQi4uUA 4EgJX3HcVy zgZAvEl3JJ S8/hcxMSBX Qdli7d1Nqa QffkZKVwBA LDACYrmcln 013SUtOZvB wAFu/8WTLi 2tJFRbY0tb a0NDQzMv2q UP91829K3N tFehn4uWcQ rf+L7a/80h oAYMyJarPz iy2uCoDOLQ DI3fti0zgA gKSobx3Xv7 oPTTwviQJB uo2xcVZWlh GXwzISF/QP /U+Hv6Gvvm ckPu6P8tBd OfFMYYqALq 4bKy0lTcin Z6QzWRy64Z +H+B8H/nUe BkGceA6fwx NFhImmjMtL ELWbx+YKuG k8Opf3n5r4 D8P+pMW5Fo nS+BFQY4yA 1HUqQH7tBy gKESDR+8Vd /6NvvvgwIH 554SqTi3P/ 7zf9Z8Gl4i WDm/A5ziUo hM4S8jMX98 TPEqABAUgC KpAHykAd6A BDYAasgC1w BG7AG/iDEB AJVgMWSASp gA+yQB7YBA pBMdgJ9oBq UAcaQTNoBc dBJzgFzoNL 4Bq4AW6D+2 AUTIBnYBa8 BgsQBGEhMk SB5CEVSBPS h8wgBmQPuU G+UBAUCcVC CRAPEkJ50G aoGCqDqqF6 qBn6HjoJnY euQIPQXWgM moZ+h97BCE yCqbASrAUb wwzYCfaBQ+ BVcAK8Bs6F C+AdcCXcAB +FO+Dz8DX4 NjwKP4PnEI AQERqiihgi DMQF8UeikH iEj6xHipAK pAFpRbqRPu QmMorMIG9R GBQFRUcZom xRnqhQFAu1 BrUeVYKqRh 1GdaB6UTdR Y6hZ1Ec0Ga 2I1kfboL3Q EegEdBa6EF 2BbkK3oy+i b6Mn0K8xGA wNo42xwnhi IjFJmLWYEs w+TBvmHGYQ M46Zw2Kx8l h9rB3WH8vE CrCF2CrsUe xZ7BB2AvsG R8Sp4Mxw7r goHA+Xj6vA HcGdwQ3hJn ELeCm8Jt4G 749n43Pwpf hGfDf+On4C v0CQJmgT7A ghhCTCJkIl oZVwkfCA8J JIJKoRrYmB RC5xI7GSeI x4mThGfEuS IemRXEjRJC FpB+kQ6Rzp LuklmUzWIj uSo8gC8g5y M/kC+RH5jQ RFwkjCS4It sUGiRqJDYk jiuSReUlPS SXK1ZK5khe QJyeuSM1J4 KS0pFymm1H qpGqmTUiNS c9IUaVNpf+ lU6RLpI9JX pKdksDJaMm 4ybJkCmYMy F2TGKQhFne JCYVE2Uxop FykTVAxVm+ pFTaIWU7+j DlBnZWVkl8 mGyWbL1sie lh2lITQtmh cthVZKO04b pr1borTEaQ lnyfYlrUuG lszLLZVzlO PIFcm1yd2W eydPl3eTT5 bfJd8p/1AB paCnEKiQpb Bf4aLCzFLq UtulrKVFS4 8vvacIK+op BimuVTyo2K 84p6Ss5KGU rlSldEFpRp mm7KicpFyu fEZ5WoWiYq /CVSlXOavy lC5Ld6Kn0C vpvfRZVUVV T1Whar3qgO qCmrZaqFq+ WpvaQ3WCOk M9Xr1cvUd9 VkNFw08jT6 NF454mXpOh mai5V7NPc1 5LWytca6tW p9aUtpy2l3 audov2Ax2y joPOGp0GnV u6GF2GbrLu Pt0berCehV 6iXo3edX1Y 31Kfq79Pf9 AAbWBtwDNo MBgxJBk6GW YathiOGdGM fI3yjTqNnh trGEcZ7zLu M/5oYmGSYt Joct9UxtTb NN+02/R3Mz 0zllmN2S1z srm7+QbzLv MXy/SXcZbt X3bHgmLhZ7 HVosfig6WV Jd+y1XLaSs Mq1qrWaoRB ZQQwShiXrd HWztYbrE9Z v7WxtBHYHL f5zdbQNtn2 iO3Ucu3lnO WNy8ft1OyY dvV2o/Z0+1 j7A/ajDqoO TIcGh8eO6o 5sxybHSSdd pySno07PnU 2c+c7tzvMu Ni7rXM65Iq 4erkWuA24y bqFu1W6P3N XcE9xb3Gc9 LDzWepzzRH v6eO7yHPFS 8mJ5NXvNel t5r/Pu9SH5 BPtU+zz21f Pl+3b7wX7e frv9HqzQXM Fb0ekP/L38 d/s/DNAOWB PwYyAmMCCw JvBJkGlQXl BfMCU4JvhI 8OsQ55DSkP uhOqHC0J4w ybDosOaw+X DX8LLw0Qjj iHUR1yIVIr mRXVHYqLCo pqi5lW4r96 yciLaILowe XqW9KnvVld UKq1NWn46R jGHGnIhFx4 bHHol9z/Rn NjDn4rziau NmWS6svaxn bEd2OXuaY8 cp40zG28WX xU8l2CXsTp hOdEisSJzh unCruS+SPJ PqkuaT/ZMP JX9KCU9pS8 Wlxqae5Mnw knm9acpp2W mD6frphemj a2zW7Fkzy/ fhN2VAGasy ugRU0c9Uv1 BHuEU4lmmf WZP5Jiss60 S2dDYvuz9H L2d7zmSue+ 63a1FrWWt7 8lTzNuWNrX NaV78eWh+3 vmeD+oaCDR MbPTYe3kTY lLzpp3yT/L L8V5vDN3cX KBVsLBjf4r GlpVCikF84 stV2a9021D butoHt5tur tn8sYhddLT Yprih+X8Iq ufqN6TeV33 zaEb9joNSy dP9OzE7ezu FdDrsOl0mX 5ZaN7/bb3V FOLy8qf7Un Zs+VimUVdX sJe4V7Ryt9 K7uqNKp2Vr 2vTqy+XeNc 01arWLu9dn 4fe9/Qfsf9 rXVKdcV17w 5wD9yp96jv aNBqqDiIOZ h58EljWGPf t4xvm5sUmo qbPhziHRo9 HHS4t9mquf mI4pHSFrhF 2DJ9NProje 9cv+tqNWyt b6O1FR8Dx4 THnn4f+/3w cZ/jPScYJ1 p/0Pyhtp3S XtQBdeR0zH Ymdo52RXYN nvQ+2dNt29 3+o9GPh06p nqo5LXu69A zhTMGZT2dz z86dSz83cz 7h/HhPTM/9 CxEXbvUG9g 5c9Ll4+ZL7 pQt9Tn1nL9 tdPnXF5srJ q4yrndcsr3 X0W/S3/2Tx U/uA5UDHda vrXTesb3QP Lh88M+QwdP 6m681Lt7xu Xbu94vbgcO jwnZHokdE7 7DtTd1Puvr iXeW/h/sYH 6AdFD6UeVj xSfNTws+7P baOWo6fHXM f6Hwc/vj/O Gn/2S8Yv7y cKnpCfVEyq TDZPmU2dmn afvvF05dOJ Z+nPFmYKf5 X+tfa5zvMf fnP8rX82Yn biBf/Fp99L Xsq/PPRq2a ueuYC5R69T Xy/MF72Rf3 P4LeNt37vw d5MLWe+x7y s/6H7o/ujz 8cGn1E+f/g UDmPP8usTo 0wAAAAlwSF lzAAAOxAAA DsQBlSsOGw AAARRJREFU OE99ksFmQ0 EUhtOHKCGU Ui6hhEieoV y6CiGrkG3I A2TVB+hThV LyDN1eSghd ZTX5P84fc5 u5d/H558z5 z5kzc+/gYV b/ZydS6F0+ pdTCCcwHUY svQQPU8Vb0 NjgKirog39 vgXWA8iZWY hBKzT76zwU Z47KV4ER/i OWL2yeMrNr iECUbiM9Y0 IXYOX7FBPs FCcPJeUEzM fu8E8CYw/g qKnkKJ2Sdv bwsvvgXGLs i3Co0X+X+A UoTy+v4PXg XX+xFDMRa3 Bjlr8Rfqvb mgqT+rdZ4X 9sGD0pRJH0 OJR3evmiOD aQQnVqE8Mt oUC40MhsKz 4GTujhJXxU Ijg5kKTmTs XKfFQiNDDg /JJBRzBcX1 4ApRBWL6a6 sYxQAAAABJ RU5ErkJggg ==</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Gener ic Process </a:Name>< a:ParentId >ROOT</a:P arentId><a :Represent ation>Elli pse</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N ot Applica ble</b:Val ue><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Authentic ates Itsel f</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>aut henticates Itself</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Not Sel ected</b:V alue><b:Va lue>Code</ b:Value><b :Value>Hum an</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Typ e</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>typ e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute><a:At tribute><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributeValu es xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Int erfaces">< b:Value>No </b:Value> <b:Value>Y es</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Mic rosoft</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>MS</a:Na me><a:Type >List</a:T ype></a:At tribute></ a:Attribut es><a:Avai lableToBas eModels xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.External Storage.OM "/><a:Beha vior i:nil ="true"/>< a:Descript ion> | |
2 | A re presentati on of an e xternal in teractor. | |
3 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>GE.EI</a :Id><a:Ima geLocation >Lower rig ht of sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABIAAAASCA YAAABWzo5X AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAL EwAACxMBAJ qcGAAAANBJ REFUOE9j+P //P1UwVkFy MJhgNPX+jw W/B2J5dA24 MJhAMwCOmc 19LgJpfnRN 2DCYQDeADG xPFYN0I7J8 aG+QgGPYHd WglJ0wvkVi 0SJWC7/PyG pgGK9B6W2T M4Fy2iDDAk qau4BsJb+i xg5savEaxG Tm8wFI64MM A2IpEBsYix +R1cAwwTAS dY1MB8mDML dt0FRsakAY r0FQ74BdAs JAtjpymCFj QoG9Ekjrg7 wI86aEe/R6 ZDUwTNBrxG LqGwTErhRi QZhBFGOsgq Tj/wwAWDij BcYFCvcAAA AASUVORK5C YII=</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Gen eric Exter nal Intera ctor</a:Na me><a:Pare ntId>ROOT< /a:ParentI d><a:Repre sentation> Rectangle< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>No</b :Value><b: Value>Yes< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Stores Credentia ls</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>st oresCreden tials</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Stores Lo g Data</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>storesLo gData</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Encrypted </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Dynamic< /a:Mode><a :Name>Encr ypted</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Signed</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>Signed< /a:Name><a :Type>List </a:Type>< /a:Attribu te><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>No</ b:Value><b :Value>Yes </b:Value> </a:Attrib uteValues> <a:Display Name>Write Access</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>AccessT ype</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> No</b:Valu e><b:Value >Yes</b:Va lue></a:At tributeVal ues><a:Dis playName>R emovable S torage</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>Removeab leStorage< /a:Name><a :Type>List </a:Type>< /a:Attribu te><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>No</ b:Value><b :Value>Yes </b:Value> </a:Attrib uteValues> <a:Display Name>Backu p</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>Bac kup</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> No</b:Valu e><b:Value >Yes</b:Va lue></a:At tributeVal ues><a:Dis playName>S hared</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >shared</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>SQL Re lational D atabase</b :Value><b: Value>Non Relational Database< /b:Value>< b:Value>Fi le System< /b:Value>< b:Value>Re gistry</b: Value><b:V alue>Confi guration</ b:Value><b :Value>Cac he</b:Valu e><b:Value >HTML5 Sto rage</b:Va lue><b:Val ue>Cookie< /b:Value>< b:Value>De vice</b:Va lue></a:At tributeVal ues><a:Dis playName>S tore Type< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Dynamic</ a:Mode><a: Name>store Type</a:Na me><a:Type >List</a:T ype></a:At tribute></ a:Attribut es><a:Avai lableToBas eModels xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.External Storage.OM "/><a:Beha vior i:nil ="true"/>< a:Descript ion> | |
4 | A re presentati on of a da ta store. | |
5 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>GE.DS</a :Id><a:Ima geLocation >Lower rig ht of sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAAIxJ REFUOE9j+P //PxwzmnrP B+L/BPB5IO aH6SFVMxgz mflcANJgQ0 jWDMMwQ8jS DMMgQ0Au0A ZiVzKxBcgF WE0nFoMNcM 6smoaPxoZh cpS7AIu/SM LDIQxKJswp xoVhikC2YZ MHYVAgCuLC MANcs6vDsM mDMMwL9jDF JGCwHrABuh FZPkgSRGGI Hu//AJbS3M IG0q+eAAAA AElFTkSuQm CC</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Gener ic Data St ore</a:Nam e><a:Paren tId>ROOT</ a:ParentId ><a:Repres entation>P arallelLin es</a:Repr esentation ><a:Shape i:nil="tru e"/></a:El ementType> <a:Element Type><a:Is Extension> false</a:I sExtension ><a:Attrib utes><a:At tribute><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributeValu es xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Int erfaces">< b:Value>No t Selected </b:Value> <b:Value>W ire</b:Val ue><b:Valu e>Wi-Fi</b :Value><b: Value>Blue tooth</b:V alue><b:Va lue>2G-4G< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Physic al Network </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Dynamic< /a:Mode><a :Name>chan nel</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Not Select ed</b:Valu e><b:Value >No</b:Val ue><b:Valu e>Yes</b:V alue></a:A ttributeVa lues><a:Di splayName> Source Aut henticated </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Dynamic< /a:Mode><a :Name>auth enticatesS ource</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Destinati on Authent icated</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>authenti catesDesti nation</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>No</b:V alue><b:Va lue>Yes</b :Value></a :Attribute Values><a: DisplayNam e>Provides Confident iality</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>provides Confidenti ality</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Provides Integrity< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Dynamic</ a:Mode><a: Name>provi desIntegri ty</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N o</b:Value ><b:Value> Yes</b:Val ue></a:Att ributeValu es><a:Disp layName>Tr ansmits XM L</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>XML enc</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Yes</b:Val ue><b:Valu e>No</b:Va lue></a:At tributeVal ues><a:Dis playName>C ontains Co okies</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >Cookies</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>No</b :Value><b: Value>Yes< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>SOAP P ayload</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>SOAP</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>No</b:V alue><b:Va lue>Yes</b :Value></a :Attribute Values><a: DisplayNam e>REST Pay load</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Dyna mic</a:Mod e><a:Name> REST</a:Na me><a:Type >List</a:T ype></a:At tribute><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >No</b:Val ue><b:Valu e>Yes</b:V alue></a:A ttributeVa lues><a:Di splayName> RSS Payloa d</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>RSS </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>No< /b:Value>< b:Value>Ye s</b:Value ></a:Attri buteValues ><a:Displa yName>JSON Payload</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>JSON</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Not S elected</b :Value><b: Value>Vali dateAntiFo rgeryToken Attribute< /b:Value>< b:Value>Vi ewStateUse rKey</b:Va lue><b:Val ue>Nonce</ b:Value><b :Value>Oth er dynamic canary</b :Value><b: Value>Stat ic header not availa ble to the browser</ b:Value><b :Value>Oth er</b:Valu e><b:Value >None</b:V alue><b:Va lue>Not ap plicable b ecause the request d oes not ch ange data< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Forger y Protecti on</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>54 851a3b-65d a-4902-b4e 0-94ef015b e735</a:Na me><a:Type >List</a:T ype></a:At tribute></ a:Attribut es><a:Avai lableToBas eModels xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.External Storage.OM "/><a:Beha vior i:nil ="true"/>< a:Descript ion> | |
6 | A un idirection al represe ntation of the flow of data be tween elem ents. | |
7 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>GE.DF</a :Id><a:Ima geLocation >Before la bel</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAAEtJ REFUOE9j+P //P1bMaOr9 Hx2jqwFhDA EYHngDYBiX RhjGKoiMR5 IBIIWkYmwG gGh0jFN8OB kA4qBhbGJY xbEagMNQrO IUGuD9HwBI kRfD8QF9Eg AAAABJRU5E rkJggg==</ a:ImageSou rce><a:Ima geStream i :nil="true "/><a:Name >Generic D ata Flow</ a:Name><a: ParentId>R OOT</a:Par entId><a:R epresentat ion>Line</ a:Represen tation><a: Shape i:ni l="true"/> </a:Elemen tType><a:E lementType ><a:IsExte nsion>fals e</a:IsExt ension><a: Attributes /><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
8 | An arc repre sentation of a trust boundary. | |
9 | </a: Descriptio n><a:Hidde n>false</a :Hidden><a :Id>GE.TB. L</a:Id><a :ImageLoca tion>Befor e label</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAAAX NSR0IArs4c 6QAAAARnQU 1BAACxjwv8 YQUAAAAZdE VYdFNvZnR3 YXJlAEFkb2 JlIEltYWdl UmVhZHlxyW U8AAABX0lE QVQ4T2NgNP XGh/mhGJsc GCNzQArtgV gfxmcy87kA wlA5ZLVwDG OAFQPp/1Dc j8zHZwiY4L UPdgLSMM0Y mM8+5JaAY5 gRkI3dAJuU UlsgjVUzCM /ZuDPg//// vEA2dgNAkq pBKTuBbKwG RNV0iQNpmC ZQGMG9AxPk 57IJvA6ksR rAYu67EEjL A7E+s7nPRe QwAWtGC0Ci MMwQkPNZ5H 0TtqArIIRB AWueUCgM9g LQEG1QGHDb Br1YuftQDJ DvapFYtAhd EwwDY+TO8c vXXUCWw8IA bMjCrXtDgD QHlK8E04CO 1YPTVoA0A9 nwQIQZAtYM xaBAw2oAFI NSLaoBSFgf GEgPgDQ2jW As5hZVCaSx GwB0Ca+iX9 I2IBusGORn 3YistTA+q4 Xf59KJcy1B arEaAMJAQ8 ABixRg6omN /fWgwF26Y3 8EzLsghfiw NhBbADELlC 8KxEpAzAHh /2cAANCSU7 ngF2KpAAAA AElFTkSuQm CC</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Gener ic Trust L ine Bounda ry</a:Name ><a:Parent Id>ROOT</a :ParentId> <a:Represe ntation>Li neBoundary </a:Repres entation>< a:Shape i: nil="true" /></a:Elem entType><a :ElementTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut es/><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
10 | A border rep resentatio n of a tru st boundar y. | |
11 | </a: Descriptio n><a:Hidde n>false</a :Hidden><a :Id>GE.TB. B</a:Id><a :ImageLoca tion>Befor e label</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGP C/xhBQAAAA lwSFlzAAAO xAAADsQBlS sOGwAAABl0 RVh0U29mdH dhcmUAQWRv YmUgSW1hZ2 VSZWFkeXHJ ZTwAAABGSU RBVDhPY/hP IWBQ9Ev6z2 jqDccPnr0E SxArzoDMAe EDZy+DFRIr DjeAVDCcDI DyyQajgTio AhGEQekdHx +bGIUGeP8H AJ4fIfJijo 6MAAAAAElF TkSuQmCC</ a:ImageSou rce><a:Ima geStream i :nil="true "/><a:Name >Generic T rust Borde r Boundary </a:Name>< a:ParentId >ROOT</a:P arentId><a :Represent ation>Bord erBoundary </a:Repres entation>< a:Shape i: nil="true" /></a:Elem entType><a :ElementTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut es/><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
12 | A re presentati on of an a nnotation. | |
13 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>GE.A</a: Id><a:Imag eLocation i:nil="tru e"/><a:Ima geSource i :nil="true "/><a:Imag eStream i: nil="true" /><a:Name> Free Text Annotation </a:Name>< a:ParentId >ROOT</a:P arentId><a :Represent ation>Anno tation</a: Representa tion><a:Sh ape i:nil= "true"/></ a:ElementT ype></a:Ge nericEleme nts><a:Man ifest><a:A uthor>TwC MSEC</a:Au thor><a:Id >cc62ebae- 3748-431e- b1df-f4220 dc9003f</a :Id><a:Nam e>SDL TM K nowledge B ase (Core) </a:Name>< a:Version> 4.1.0.10</ a:Version> </a:Manife st><a:Stan dardElemen ts><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes/>< a:Availabl eToBaseMod els xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Ex ternalStor age.OM"/>< a:Behavior i:nil="tr ue"/><a:De scription> | |
14 | A Wi ndows Proc ess. | |
15 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.OSProc ess</a:Id> <a:ImageLo cation>Cen tered on s tencil</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA EFJREFUOE9 jYDT1ngnE/ 8nEM0EG/EE TJAV/ABmAT YJYTD0DQDQ 5eNSAUQNAm DoGgDITugS xGGzAfCAGu YIM7D0HAH9 a5DRx46KEA AAAAElFTkS uQmCC</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>OS Process</ a:Name><a: ParentId>G E.P</a:Par entId><a:R epresentat ion>Ellips e</a:Repre sentation> <a:Shape i :nil="true "/></a:Ele mentType>< a:ElementT ype><a:IsE xtension>f alse</a:Is Extension> <a:Attribu tes/><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
16 | A th read of ex ecution in a Windows process. | |
17 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.Thread </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAAEFJ REFUOE9jYD T1ngnE/8nE M0EG/EETJA V/ABmATYJY TD0DQDQ5eN SAUQNAmDoG gDITugSxGG zAfCAGuYIM 7D0HAH9a5D Rx46KEAAAA AElFTkSuQm CC</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Threa d</a:Name> <a:ParentI d>GE.P</a: ParentId>< a:Represen tation>Ell ipse</a:Re presentati on><a:Shap e i:nil="t rue"/></a: ElementTyp e><a:Eleme ntType><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibutes><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Unmanaged< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Code T ype</a:Dis playName>< a:Inherita nce>Virtua l</a:Inher itance><a: Mode>Stati c</a:Mode> <a:Name>co deType</a: Name><a:Ty pe>List</a :Type></a: Attribute> </a:Attrib utes><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
18 | A th read of ex ecution in the Windo ws kernel. | |
19 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.Kernel Thread</a: Id><a:Imag eLocation> Centered o n stencil< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA BGdBTUEAAL GOfPtRkwAA ACBjSFJNAA CHDwAAjA8A AP1SAACBQA AAfXkAAOmL AAA85QAAGc xzPIV3AAAK OWlDQ1BQaG 90b3Nob3Ag SUNDIHByb2 ZpbGUAAEjH nZZ3VFTXFo fPvXd6oc0w AlKG3rvAAN J7k15FYZgZ YCgDDjM0sS GiAhFFRJoi SFDEgNFQJF ZEsRAUVLAH JAgoMRhFVC xvRtaLrqy8 9/Ly++Osb+ 2z97n77L3P WhcAkqcvl5 cGSwGQyhPw gzyc6RGRUX TsAIABHmCA KQBMVka6X7 B7CBDJy82F niFyAl8EAf B6WLwCcNPQ M4BOB/+fpF npfIHomAAR m7M5GSwRF4 g4JUuQLrbP ipgalyxmGC VmvihBEcuJ OWGRDT77LL KjmNmpPLaI xTmns1PZYu 4V8bZMIUfE iK+ICzO5nC wR3xKxRoow lSviN+LYVA 4zAwAUSWwX cFiJIjYRMY kfEuQi4uUA 4EgJX3HcVy zgZAvEl3JJ S8/hcxMSBX Qdli7d1Nqa QffkZKVwBA LDACYrmcln 013SUtOZvB wAFu/8WTLi 2tJFRbY0tb a0NDQzMv2q UP91829K3N tFehn4uWcQ rf+L7a/80h oAYMyJarPz iy2uCoDOLQ DI3fti0zgA gKSobx3Xv7 oPTTwviQJB uo2xcVZWlh GXwzISF/QP /U+Hv6Gvvm ckPu6P8tBd OfFMYYqALq 4bKy0lTcin Z6QzWRy64Z +H+B8H/nUe BkGceA6fwx NFhImmjMtL ELWbx+YKuG k8Opf3n5r4 D8P+pMW5Fo nS+BFQY4yA 1HUqQH7tBy gKESDR+8Vd /6NvvvgwIH 554SqTi3P/ 7zf9Z8Gl4i WDm/A5ziUo hM4S8jMX98 TPEqABAUgC KpAHykAd6A BDYAasgC1w BG7AG/iDEB AJVgMWSASp gA+yQB7YBA pBMdgJ9oBq UAcaQTNoBc dBJzgFzoNL 4Bq4AW6D+2 AUTIBnYBa8 BgsQBGEhMk SB5CEVSBPS h8wgBmQPuU G+UBAUCcVC CRAPEkJ50G aoGCqDqqF6 qBn6HjoJnY euQIPQXWgM moZ+h97BCE yCqbASrAUb wwzYCfaBQ+ BVcAK8Bs6F C+AdcCXcAB +FO+Dz8DX4 NjwKP4PnEI AQERqiihgi DMQF8UeikH iEj6xHipAK pAFpRbqRPu QmMorMIG9R GBQFRUcZom xRnqhQFAu1 BrUeVYKqRh 1GdaB6UTdR Y6hZ1Ec0Ga 2I1kfboL3Q EegEdBa6EF 2BbkK3oy+i b6Mn0K8xGA wNo42xwnhi IjFJmLWYEs w+TBvmHGYQ M46Zw2Kx8l h9rB3WH8vE CrCF2CrsUe xZ7BB2AvsG R8Sp4Mxw7r goHA+Xj6vA HcGdwQ3hJn ELeCm8Jt4G 749n43Pwpf hGfDf+On4C v0CQJmgT7A ghhCTCJkIl oZVwkfCA8J JIJKoRrYmB RC5xI7GSeI x4mThGfEuS IemRXEjRJC FpB+kQ6Rzp LuklmUzWIj uSo8gC8g5y M/kC+RH5jQ RFwkjCS4It sUGiRqJDYk jiuSReUlPS SXK1ZK5khe QJyeuSM1J4 KS0pFymm1H qpGqmTUiNS c9IUaVNpf+ lU6RLpI9JX pKdksDJaMm 4ybJkCmYMy F2TGKQhFne JCYVE2Uxop FykTVAxVm+ pFTaIWU7+j DlBnZWVkl8 mGyWbL1sie lh2lITQtmh cthVZKO04b pr1borTEaQ lnyfYlrUuG lszLLZVzlO PIFcm1yd2W eydPl3eTT5 bfJd8p/1AB paCnEKiQpb Bf4aLCzFLq UtulrKVFS4 8vvacIK+op BimuVTyo2K 84p6Ss5KGU rlSldEFpRp mm7KicpFyu fEZ5WoWiYq /CVSlXOavy lC5Ld6Kn0C vpvfRZVUVV T1Whar3qgO qCmrZaqFq+ WpvaQ3WCOk M9Xr1cvUd9 VkNFw08jT6 NF454mXpOh mai5V7NPc1 5LWytca6tW p9aUtpy2l3 audov2Ax2y joPOGp0GnV u6GF2GbrLu Pt0berCehV 6iXo3edX1Y 31Kfq79Pf9 AAbWBtwDNo MBgxJBk6GW YathiOGdGM fI3yjTqNnh trGEcZ7zLu M/5oYmGSYt Joct9UxtTb NN+02/R3Mz 0zllmN2S1z srm7+QbzLv MXy/SXcZbt X3bHgmLhZ7 HVosfig6WV Jd+y1XLaSs Mq1qrWaoRB ZQQwShiXrd HWztYbrE9Z v7WxtBHYHL f5zdbQNtn2 iO3Ucu3lnO WNy8ft1OyY dvV2o/Z0+1 j7A/ajDqoO TIcGh8eO6o 5sxybHSSdd pySno07PnU 2c+c7tzvMu Ni7rXM65Iq 4erkWuA24y bqFu1W6P3N XcE9xb3Gc9 LDzWepzzRH v6eO7yHPFS 8mJ5NXvNel t5r/Pu9SH5 BPtU+zz21f Pl+3b7wX7e frv9HqzQXM Fb0ekP/L38 d/s/DNAOWB PwYyAmMCCw JvBJkGlQXl BfMCU4JvhI 8OsQ55DSkP uhOqHC0J4w ybDosOaw+X DX8LLw0Qjj iHUR1yIVIr mRXVHYqLCo pqi5lW4r96 yciLaILowe XqW9KnvVld UKq1NWn46R jGHGnIhFx4 bHHol9z/Rn NjDn4rziau NmWS6svaxn bEd2OXuaY8 cp40zG28WX xU8l2CXsTp hOdEisSJzh unCruS+SPJ PqkuaT/ZMP JX9KCU9pS8 Wlxqae5Mnw knm9acpp2W mD6frphemj a2zW7Fkzy/ fhN2VAGasy ugRU0c9Uv1 BHuEU4lmmf WZP5Jiss60 S2dDYvuz9H L2d7zmSue+ 63a1FrWWt7 8lTzNuWNrX NaV78eWh+3 vmeD+oaCDR MbPTYe3kTY lLzpp3yT/L L8V5vDN3cX KBVsLBjf4r GlpVCikF84 stV2a9021D butoHt5tur tn8sYhddLT Yprih+X8Iq ufqN6TeV33 zaEb9joNSy dP9OzE7ezu FdDrsOl0mX 5ZaN7/bb3V FOLy8qf7Un Zs+VimUVdX sJe4V7Ryt9 K7uqNKp2Vr 2vTqy+XeNc 01arWLu9dn 4fe9/Qfsf9 rXVKdcV17w 5wD9yp96jv aNBqqDiIOZ h58EljWGPf t4xvm5sUmo qbPhziHRo9 HHS4t9mquf mI4pHSFrhF 2DJ9NProje 9cv+tqNWyt b6O1FR8Dx4 THnn4f+/3w cZ/jPScYJ1 p/0Pyhtp3S XtQBdeR0zH Ymdo52RXYN nvQ+2dNt29 3+o9GPh06p nqo5LXu69A zhTMGZT2dz z86dSz83cz 7h/HhPTM/9 CxEXbvUG9g 5c9Ll4+ZL7 pQt9Tn1nL9 tdPnXF5srJ q4yrndcsr3 X0W/S3/2Tx U/uA5UDHda vrXTesb3QP Lh88M+QwdP 6m681Lt7xu Xbu94vbgcO jwnZHokdE7 7DtTd1Puvr iXeW/h/sYH 6AdFD6UeVj xSfNTws+7P baOWo6fHXM f6Hwc/vj/O Gn/2S8Yv7y cKnpCfVEyq TDZPmU2dmn afvvF05dOJ Z+nPFmYKf5 X+tfa5zvMf fnP8rX82Yn biBf/Fp99L Xsq/PPRq2a ueuYC5R69T Xy/MF72Rf3 P4LeNt37vw d5MLWe+x7y s/6H7o/ujz 8cGn1E+f/g UDmPP8usTo 0wAAAAlwSF lzAAAOxAAA DsQBlSsOGw AAAEFJREFU OE9jYDT1ng nE/8nEM0EG /EETJAV/AB mATYJYTD0D QDQ5eNSAUQ NAmDoGgDIT ugSxGGzAfC AGuYIM7D0H AH9a5DRx46 KEAAAAAElF TkSuQmCC</ a:ImageSou rce><a:Ima geStream i :nil="true "/><a:Name >Kernel Th read</a:Na me><a:Pare ntId>GE.P< /a:ParentI d><a:Repre sentation> Ellipse</a :Represent ation><a:S hape i:nil ="true"/>< /a:Element Type><a:El ementType> <a:IsExten sion>false </a:IsExte nsion><a:A ttributes> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Unmanag ed</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Cod e Type</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>St atic</a:Mo de><a:Name >codeType< /a:Name><a :Type>List </a:Type>< /a:Attribu te></a:Att ributes><a :Available ToBaseMode ls xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Ext ernalStora ge.OM"/><a :Behavior i:nil="tru e"/><a:Des cription> | |
20 | A re presentati on of a Wi n32 or Win 64 applica tion. | |
21 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.WinApp </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAAEFJ REFUOE9jYD T1ngnE/8nE M0EG/EETJA V/ABmATYJY TD0DQDQ5eN SAUQNAmDoG gDITugSxGG zAfCAGuYIM 7D0HAH9a5D Rx46KEAAAA AElFTkSuQm CC</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Nativ e Applicat ion</a:Nam e><a:Paren tId>GE.P</ a:ParentId ><a:Repres entation>E llipse</a: Representa tion><a:Sh ape i:nil= "true"/></ a:ElementT ype><a:Ele mentType>< a:IsExtens ion>false< /a:IsExten sion><a:At tributes>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>Managed< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Code T ype</a:Dis playName>< a:Inherita nce>Virtua l</a:Inher itance><a: Mode>Stati c</a:Mode> <a:Name>co deType</a: Name><a:Ty pe>List</a :Type></a: Attribute> </a:Attrib utes><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
22 | A re presentati on of a .N ET Web app lication. | |
23 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.NetApp </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAANFJ REFUOE+t09 EGAkEUxvF6 lG6jqxQR3c bQbURERER0 FV31ErEsve I+QNT3X3NY szPsji5+Zs ycvjk7o8Fw 5gr5ZioI+A SLfVQExDa6 +l8AY45kgJ O7HGQvD78W 1kUD+MFYlj LxmE9lJ83a VsBRLsLTnu XpMWftKtQk A+yErR+tA+ Z01qxBK+Al J+E0RuuAee lH9pIBls7l MfbuYCNruQ kXx6dgLrwK e9QkA8BJI1 mJdcCcEOvC RAPA6dw4nw JeYSFhXR3A nync6KoOeA tdZHDlD8vn /L46Hi6/AA AAAElFTkSu QmCC</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Man aged Appli cation</a: Name><a:Pa rentId>GE. P</a:Paren tId><a:Rep resentatio n>Ellipse< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Unman aged</b:Va lue></a:At tributeVal ues><a:Dis playName>C ode Type</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>codeTyp e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute></a:A ttributes> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
24 | A repr esentation of a thic k client.. | |
25 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.ThickC lient</a:I d><a:Image Location>C entered on stencil</ a:ImageLoc ation><a:I mageSource >iVBORw0KG goAAAANSUh EUgAAABAAA AAQCAYAAAA f8/9hAAAAB GdBTUEAALG OfPtRkwAAA CBjSFJNAAC HDwAAjA8AA P1SAACBQAA AfXkAAOmLA AA85QAAGcx zPIV3AAAKO WlDQ1BQaG9 0b3Nob3AgS UNDIHByb2Z pbGUAAEjHn ZZ3VFTXFof PvXd6oc0wA lKG3rvAANJ 7k15FYZgZY CgDDjM0sSG iAhFFRJoiS FDEgNFQJFZ EsRAUVLAHJ AgoMRhFVCx vRtaLrqy89 /Ly++Osb+2 z97n77L3PW hcAkqcvl5c GSwGQyhPwg zyc6RGRUXT sAIABHmCAK QBMVka6X7B 7CBDJy82Fn iFyAl8EAfB 6WLwCcNPQM 4BOB/+fpFn pfIHomAARm 7M5GSwRF4g 4JUuQLrbPi pgalyxmGCV mvihBEcuJO WGRDT77LLK jmNmpPLaIx Tmns1PZYu4 V8bZMIUfEi K+ICzO5nCw R3xKxRoowl SviN+LYVA4 zAwAUSWwXc FiJIjYRMYk fEuQi4uUA4 EgJX3HcVyz gZAvEl3JJS 8/hcxMSBXQ dli7d1NqaQ ffkZKVwBAL DACYrmcln0 13SUtOZvBw AFu/8WTLi2 tJFRbY0tba 0NDQzMv2qU P91829K3Nt Fehn4uWcQr f+L7a/80ho AYMyJarPzi y2uCoDOLQD I3fti0zgAg KSobx3Xv7o PTTwviQJBu o2xcVZWlhG XwzISF/QP/ U+Hv6Gvvmc kPu6P8tBdO fFMYYqALq4 bKy0lTcinZ 6QzWRy64Z+ H+B8H/nUeB kGceA6fwxN FhImmjMtLE LWbx+YKuGk 8Opf3n5r4D 8P+pMW5Fon S+BFQY4yA1 HUqQH7tByg KESDR+8Vd/ 6NvvvgwIH5 54SqTi3P/7 zf9Z8Gl4iW Dm/A5ziUoh M4S8jMX98T PEqABAUgCK pAHykAd6AB DYAasgC1wB G7AG/iDEBA JVgMWSASpg A+yQB7YBAp BMdgJ9oBqU AcaQTNoBcd BJzgFzoNL4 Bq4AW6D+2A UTIBnYBa8B gsQBGEhMkS B5CEVSBPSh 8wgBmQPuUG +UBAUCcVCC RAPEkJ50Ga oGCqDqqF6q Bn6HjoJnYe uQIPQXWgMm oZ+h97BCEy CqbASrAUbw wzYCfaBQ+B VcAK8Bs6FC +AdcCXcAB+ FO+Dz8DX4N jwKP4PnEIA QERqiihgiD MQF8UeikHi Ej6xHipAKp AFpRbqRPuQ mMorMIG9RG BQFRUcZomx RnqhQFAu1B rUeVYKqRh1 GdaB6UTdRY 6hZ1Ec0Ga2 I1kfboL3QE egEdBa6EF2 BbkK3oy+ib 6Mn0K8xGAw No42xwnhiI jFJmLWYEsw +TBvmHGYQM 46Zw2Kx8lh 9rB3WH8vEC rCF2CrsUex Z7BB2AvsGR 8Sp4Mxw7rg oHA+Xj6vAH cGdwQ3hJnE LeCm8Jt4G7 49n43Pwpfh GfDf+On4Cv 0CQJmgT7Ag hhCTCJkIlo ZVwkfCA8JJ IJKoRrYmBR C5xI7GSeIx 4mThGfEuSI emRXEjRJCF pB+kQ6RzpL uklmUzWIju So8gC8g5yM /kC+RH5jQR FwkjCS4Its UGiRqJDYkj iuSReUlPSS XK1ZK5kheQ JyeuSM1J4K S0pFymm1Hq pGqmTUiNSc 9IUaVNpf+l U6RLpI9JXp KdksDJaMm4 ybJkCmYMyF 2TGKQhFneJ CYVE2UxopF ykTVAxVm+p FTaIWU7+jD lBnZWVkl8m GyWbL1siel h2lITQtmhc thVZKO04bp r1borTEaQl nyfYlrUuGl szLLZVzlOP IFcm1yd2We ydPl3eTT5b fJd8p/1ABp aCnEKiQpbB f4aLCzFLqU tulrKVFS48 vvacIK+opB imuVTyo2K8 4p6Ss5KGUr lSldEFpRpm m7KicpFyuf EZ5WoWiYq/ CVSlXOavyl C5Ld6Kn0Cv pvfRZVUVVT 1Whar3qgOq CmrZaqFq+W pvaQ3WCOkM 9Xr1cvUd9V kNFw08jT6N F454mXpOhm ai5V7NPc15 LWytca6tWp 9aUtpy2l3a udov2Ax2yj oPOGp0GnVu 6GF2GbrLuP t0berCehV6 iXo3edX1Y3 1Kfq79Pf9A AbWBtwDNoM BgxJBk6GWY athiOGdGMf I3yjTqNnht rGEcZ7zLuM /5oYmGSYtJ oct9UxtTbN N+02/R3Mz0 zllmN2S1zs rm7+QbzLvM Xy/SXcZbtX 3bHgmLhZ7H Vosfig6WVJ d+y1XLaSsM q1qrWaoRBZ QQwShiXrdH WztYbrE9Zv 7WxtBHYHLf 5zdbQNtn2i O3Ucu3lnOW Ny8ft1OyYd vV2o/Z0+1j 7A/ajDqoOT IcGh8eO6o5 sxybHSSddp ySno07PnU2 c+c7tzvMuN i7rXM65Iq4 erkWuA24yb qFu1W6P3NX cE9xb3Gc9L DzWepzzRHv 6eO7yHPFS8 mJ5NXvNelt 5r/Pu9SH5B PtU+zz21fP l+3b7wX7ef rv9HqzQXMF b0ekP/L38d /s/DNAOWBP wYyAmMCCwJ vBJkGlQXlB fMCU4JvhI8 OsQ55DSkPu hOqHC0J4wy bDosOaw+XD X8LLw0Qjji HUR1yIVIrm RXVHYqLCop qi5lW4r96y ciLaILoweX qW9KnvVldU Kq1NWn46Rj GHGnIhFx4b HHol9z/RnN jDn4rziauN mWS6svaxnb Ed2OXuaY8c p40zG28WXx U8l2CXsTph OdEisSJzhu nCruS+SPJP qkuaT/ZMPJ X9KCU9pS8W lxqae5Mnwk nm9acpp2Wm D6frphemja 2zW7Fkzy/f hN2VAGasyu gRU0c9Uv1B HuEU4lmmfW ZP5Jiss60S 2dDYvuz9HL 2d7zmSue+6 3a1FrWWt78 lTzNuWNrXN aV78eWh+3v meD+oaCDRM bPTYe3kTYl Lzpp3yT/LL 8V5vDN3cXK BVsLBjf4rG lpVCikF84s tV2a9021Db utoHt5turt n8sYhddLTY prih+X8Iqu fqN6TeV33z aEb9joNSyd P9OzE7ezuF dDrsOl0mX5 ZaN7/bb3VF OLy8qf7UnZ s+VimUVdXs Je4V7Ryt9K 7uqNKp2Vr2 vTqy+XeNc0 1arWLu9dn4 fe9/Qfsf9r XVKdcV17w5 wD9yp96jva NBqqDiIOZh 58EljWGPft 4xvm5sUmoq bPhziHRo9H HS4t9mqufm I4pHSFrhF2 DJ9NProje9 cv+tqNWytb 6O1FR8Dx4T Hnn4f+/3wc Z/jPScYJ1p /0Pyhtp3SX tQBdeR0zHY mdo52RXYNn vQ+2dNt293 +o9GPh06pn qo5LXu69Az hTMGZT2dzz 86dSz83cz7 h/HhPTM/9C xEXbvUG9g5 c9Ll4+ZL7p Qt9Tn1nL9t dPnXF5srJq 4yrndcsr3X 0W/S3/2TxU /uA5UDHdav rXTesb3QPL h88M+QwdP6 m681Lt7xuX bu94vbgcOj wnZHokdE77 DtTd1Puvri XeW/h/sYH6 AdFD6UeVjx SfNTws+7Pb aOWo6fHXMf 6Hwc/vj/OG n/2S8Yv7yc KnpCfVEyqT DZPmU2dmna fvvF05dOJZ +nPFmYKf5X +tfa5zvMff nP8rX82Ynb iBf/Fp99LX sq/PPRq2au euYC5R69TX y/MF72Rf3P 4LeNt37vwd 5MLWe+x7ys /6H7o/ujz8 cGn1E+f/gU DmPP8usTo0 wAAAAlwSFl zAAAOxAAAD sQBlSsOGwA AAGBJREFUO E/FjdEJwDA IBe1QnaJ7B zpA5nmpH8K jkaC2kI9L5 MBTAHzClRn kOK/+gABdF 95+EissoL/ N/wRMrOAAs yfArhRgSgF 2pQBTCrDT5 9YhQLMlZrq UxZUZXBkHM gDkpHNwRk9 QLgAAAABJR U5ErkJggg= =</a:Image Source><a: ImageStrea m i:nil="t rue"/><a:N ame>Thick Client</a: Name><a:Pa rentId>GE. P</a:Paren tId><a:Rep resentatio n>Ellipse< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Unman aged</b:Va lue></a:At tributeVal ues><a:Dis playName>C ode Type</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>codeTyp e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute></a:A ttributes> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
26 | A re presentati on of a br owser clie nt. | |
27 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.Browse rClient</a :Id><a:Ima geLocation >Centered on stencil </a:ImageL ocation><a :ImageSour ce>iVBORw0 KGgoAAAANS UhEUgAAABA AAAAQCAYAA AAf8/9hAAA ABGdBTUEAA LGOfPtRkwA AACBjSFJNA ACHDwAAjA8 AAP1SAACBQ AAAfXkAAOm LAAA85QAAG cxzPIV3AAA KOWlDQ1BQa G90b3Nob3A gSUNDIHByb 2ZpbGUAAEj HnZZ3VFTXF ofPvXd6oc0 wAlKG3rvAA NJ7k15FYZg ZYCgDDjM0s SGiAhFFRJo iSFDEgNFQJ FZEsRAUVLA HJAgoMRhFV CxvRtaLrqy 89/Ly++Osb +2z97n77L3 PWhcAkqcvl 5cGSwGQyhP wgzyc6RGRU XTsAIABHmC AKQBMVka6X 7B7CBDJy82 FniFyAl8EA fB6WLwCcNP QM4BOB/+fp FnpfIHomAA Rm7M5GSwRF 4g4JUuQLrb PipgalyxmG CVmvihBEcu JOWGRDT77L LKjmNmpPLa IxTmns1PZY u4V8bZMIUf EiK+ICzO5n CwR3xKxRoo wlSviN+LYV A4zAwAUSWw XcFiJIjYRM YkfEuQi4uU A4EgJX3HcV yzgZAvEl3J JS8/hcxMSB XQdli7d1Nq aQffkZKVwB ALDACYrmcl n013SUtOZv BwAFu/8WTL i2tJFRbY0t ba0NDQzMv2 qUP91829K3 NtFehn4uWc Qrf+L7a/80 hoAYMyJarP ziy2uCoDOL QDI3fti0zg AgKSobx3Xv 7oPTTwviQJ Buo2xcVZWl hGXwzISF/Q P/U+Hv6Gvv mckPu6P8tB dOfFMYYqAL q4bKy0lTci nZ6QzWRy64 Z+H+B8H/nU eBkGceA6fw xNFhImmjMt LELWbx+YKu Gk8Opf3n5r 4D8P+pMW5F onS+BFQY4y A1HUqQH7tB ygKESDR+8V d/6NvvvgwI H554SqTi3P /7zf9Z8Gl4 iWDm/A5ziU ohM4S8jMX9 8TPEqABAUg CKpAHykAd6 ABDYAasgC1 wBG7AG/iDE BAJVgMWSAS pgA+yQB7YB ApBMdgJ9oB qUAcaQTNoB cdBJzgFzoN L4Bq4AW6D+ 2AUTIBnYBa 8BgsQBGEhM kSB5CEVSBP Sh8wgBmQPu UG+UBAUCcV CCRAPEkJ50 GaoGCqDqqF 6qBn6HjoJn YeuQIPQXWg MmoZ+h97BC EyCqbASrAU bwwzYCfaBQ +BVcAK8Bs6 FC+AdcCXcA B+FO+Dz8DX 4NjwKP4PnE IAQERqiihg iDMQF8Ueik HiEj6xHipA KpAFpRbqRP uQmMorMIG9 RGBQFRUcZo mxRnqhQFAu 1BrUeVYKqR h1GdaB6UTd RY6hZ1Ec0G a2I1kfboL3 QEegEdBa6E F2BbkK3oy+ ib6Mn0K8xG AwNo42xwnh iIjFJmLWYE sw+TBvmHGY QM46Zw2Kx8 lh9rB3WH8v ECrCF2CrsU exZ7BB2Avs GR8Sp4Mxw7 rgoHA+Xj6v AHcGdwQ3hJ nELeCm8Jt4 G749n43Pwp fhGfDf+On4 Cv0CQJmgT7 AghhCTCJkI loZVwkfCA8 JJIJKoRrYm BRC5xI7GSe Ix4mThGfEu SIemRXEjRJ CFpB+kQ6Rz pLuklmUzWI juSo8gC8g5 yM/kC+RH5j QRFwkjCS4I tsUGiRqJDY kjiuSReUlP SSXK1ZK5kh eQJyeuSM1J 4KS0pFymm1 HqpGqmTUiN Sc9IUaVNpf +lU6RLpI9J XpKdksDJaM m4ybJkCmYM yF2TGKQhFn eJCYVE2Uxo pFykTVAxVm +pFTaIWU7+ jDlBnZWVkl 8mGyWbL1si elh2lITQtm hcthVZKO04 bpr1borTEa QlnyfYlrUu GlszLLZVzl OPIFcm1yd2 WeydPl3eTT 5bfJd8p/1A BpaCnEKiQp bBf4aLCzFL qUtulrKVFS 48vvacIK+o pBimuVTyo2 K84p6Ss5KG UrlSldEFpR pmm7KicpFy ufEZ5WoWiY q/CVSlXOav ylC5Ld6Kn0 CvpvfRZVUV VT1Whar3qg OqCmrZaqFq +WpvaQ3WCO kM9Xr1cvUd 9VkNFw08jT 6NF454mXpO hmai5V7NPc 15LWytca6t Wp9aUtpy2l 3audov2Ax2 yjoPOGp0Gn Vu6GF2GbrL uPt0berCeh V6iXo3edX1 Y31Kfq79Pf 9AAbWBtwDN oMBgxJBk6G WYathiOGdG MfI3yjTqNn htrGEcZ7zL uM/5oYmGSY tJoct9UxtT bNN+02/R3M z0zllmN2S1 zsrm7+QbzL vMXy/SXcZb tX3bHgmLhZ 7HVosfig6W VJd+y1XLaS sMq1qrWaoR BZQQwShiXr dHWztYbrE9 Zv7WxtBHYH Lf5zdbQNtn 2iO3Ucu3ln OWNy8ft1Oy YdvV2o/Z0+ 1j7A/ajDqo OTIcGh8eO6 o5sxybHSSd dpySno07Pn U2c+c7tzvM uNi7rXM65I q4erkWuA24 ybqFu1W6P3 NXcE9xb3Gc 9LDzWepzzR Hv6eO7yHPF S8mJ5NXvNe lt5r/Pu9SH 5BPtU+zz21 fPl+3b7wX7 efrv9HqzQX MFb0ekP/L3 8d/s/DNAOW BPwYyAmMCC wJvBJkGlQX lBfMCU4Jvh I8OsQ55DSk PuhOqHC0J4 wybDosOaw+ XDX8LLw0Qj jiHUR1yIVI rmRXVHYqLC opqi5lW4r9 6yciLaILow eXqW9KnvVl dUKq1NWn46 RjGHGnIhFx 4bHHol9z/R nNjDn4rzia uNmWS6svax nbEd2OXuaY 8cp40zG28W XxU8l2CXsT phOdEisSJz hunCruS+SP JPqkuaT/ZM PJX9KCU9pS 8Wlxqae5Mn wknm9acpp2 WmD6frphem ja2zW7Fkzy /fhN2VAGas yugRU0c9Uv 1BHuEU4lmm fWZP5Jiss6 0S2dDYvuz9 HL2d7zmSue +63a1FrWWt 78lTzNuWNr XNaV78eWh+ 3vmeD+oaCD RMbPTYe3kT YlLzpp3yT/ LL8V5vDN3c XKBVsLBjf4 rGlpVCikF8 4stV2a9021 DbutoHt5tu rtn8sYhddL TYprih+X8I qufqN6TeV3 3zaEb9joNS ydP9OzE7ez uFdDrsOl0m X5ZaN7/bb3 VFOLy8qf7U nZs+VimUVd XsJe4V7Ryt 9K7uqNKp2V r2vTqy+XeN c01arWLu9d n4fe9/Qfsf 9rXVKdcV17 w5wD9yp96j vaNBqqDiIO Zh58EljWGP ft4xvm5sUm oqbPhziHRo 9HHS4t9mqu fmI4pHSFrh F2DJ9NProj e9cv+tqNWy tb6O1FR8Dx 4THnn4f+/3 wcZ/jPScYJ 1p/0Pyhtp3 SXtQBdeR0z HYmdo52RXY NnvQ+2dNt2 93+o9GPh06 pnqo5LXu69 AzhTMGZT2d zz86dSz83c z7h/HhPTM/ 9CxEXbvUG9 g5c9Ll4+ZL 7pQt9Tn1nL 9tdPnXF5sr Jq4yrndcsr 3X0W/S3/2T xU/uA5UDHd avrXTesb3Q PLh88M+Qwd P6m681Lt7x uXbu94vbgc OjwnZHokdE 77DtTd1Puv riXeW/h/sY H6AdFD6UeV jxSfNTws+7 PbaOWo6fHX Mf6Hwc/vj/ OGn/2S8Yv7 ycKnpCfVEy qTDZPmU2dm nafvvF05dO JZ+nPFmYKf 5X+tfa5zvM ffnP8rX82Y nbiBf/Fp99 LXsq/PPRq2 aueuYC5R69 TXy/MF72Rf 3P4LeNt37v wd5MLWe+x7 ys/6H7o/uj z8cGn1E+f/ gUDmPP8usT o0wAAAAlwS FlzAAAOxAA ADsQBlSsOG wAAASBJREF UOE+l0q1LB GEQx/FdMMs Vg/H+AG1Wm xqMZ1WDWC5 dUMQiyImIQ VARRTGpRVH wpYigd/iCm LQZBINYD8y G576/Y0Y27 AOehs/O7PA 8s/PwbBJC+ JfcYjuStG/ Y9WAML9jAE 0ZQRGuNNhB Dlm+exDvqK mLP4hXeMIi fBv515Xp04 Rrb2MIdZiy u4NB0xBos4 RZzOMYNplH DPhZwj7Jvy lJBo+tFi78 s37X4iSPLa 7EGq9D441j DJkattowJy +e9gaLnenw ogcb/tvzAY gMXltdjE1R wjins4ARli +uYhZqUYhN 04gFqoi+/o mpRt6Kr1XR pbAIZwjMuV YQf4QyP6EX 0P3DdGMApF qEj9KOA1pr cCbzbX+UW2 5Fb/L2QNAG 8ROHz0OoHe wAAAABJRU5 ErkJggg==< /a:ImageSo urce><a:Im ageStream i:nil="tru e"/><a:Nam e>Browser Client</a: Name><a:Pa rentId>GE. P</a:Paren tId><a:Rep resentatio n>Ellipse< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>No</b :Value><b: Value>Yes< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Active X</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>Act iveX</a:Na me><a:Type >List</a:T ype></a:At tribute><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >No</b:Val ue><b:Valu e>Yes</b:V alue></a:A ttributeVa lues><a:Di splayName> Brower Plu g-in Objec t (BHO)</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>BHO</a: Name><a:Ty pe>List</a :Type></a: Attribute> </a:Attrib utes><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
28 | A re presentati on of an b rowser plu gin. | |
29 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.PlugIn </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAANxJ REFUOE+l07 0OwVAYgGEd DG7BbJUYMP hZJKYmBgYJ g9lgwCDhAo TJHXSR2A0M RPxdA4nRDR gYxML7JW3S oI62w5PTnp 68+XKSBrSE XsPTI0MCl7 dNVyRgvciz G64CafTQte 0pA1G0McAS Kdi//wyUcc QaMzxwRgzW GcdAGAdskU EIHciZFZSB LDaYY4wJpp AzMokyEMcO ezTRQh1VVK AMyLgnXJGE hgL6kLtRBk Zo4A7Zv5mr jJ/HXwFZS1 hA7mKICKwz wjGQQxEyft Dc++Yj4IkE fP9MPn5n3X gBkdQdpG8e ZzEAAAAASU VORK5CYII= </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>Browser and Activ eX Plugins </a:Name>< a:ParentId >GE.P</a:P arentId><a :Represent ation>Elli pse</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>M anaged</b: Value></a: AttributeV alues><a:D isplayName >Code Type </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Static</ a:Mode><a: Name>codeT ype</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute></a :Attribute s><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
30 | A re presentati on of an W eb Server Process. | |
31 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.WebSer ver</a:Id> <a:ImageLo cation>Cen tered on s tencil</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA J5JREFUOE9 j+P//Pxgzm nr/JwejGOC cWTWtZMKcY mIxhgGu2dV hQLYgsRjDA N2ILB8Ynxg MNgBEYMH22 DSgY5BarAY Q6xKQWjABC jwBx7A7qkE pO8kyAB3T3 wDk+Ec2iBi M1QW4DMSW0 LC6ADlBIRu ALaERDAOLx KJFMBxS3qY HE4dhnAZgE 0fC8IQGIly xYJDzsInDM EgebgAF+D8 DAHhvQ2cWC f/0AAAAAEl FTkSuQmCC< /a:ImageSo urce><a:Im ageStream i:nil="tru e"/><a:Nam e>Web Serv er</a:Name ><a:Parent Id>GE.P</a :ParentId> <a:Represe ntation>El lipse</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >Local</b: Value><b:V alue>Web</ b:Value></ a:Attribut eValues><a :DisplayNa me>Context </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Dynamic< /a:Mode><a :Name>cont ext</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Not Select ed</b:Valu e><b:Value >Yes</b:Va lue><b:Val ue>No</b:V alue></a:A ttributeVa lues><a:Di splayName> Documents Library ca pability</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>docume ntsLibrary </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>Not Selected< /b:Value>< b:Value>Ye s</b:Value ><b:Value> No</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Ent erprise Au thenticati on capabil ity</a:Dis playName>< a:Inherita nce>Virtua l</a:Inher itance><a: Mode>Dynam ic</a:Mode ><a:Name>e nterprizeA uthenticat ion</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Not Select ed</b:Valu e><b:Value >Yes</b:Va lue><b:Val ue>No</b:V alue></a:A ttributeVa lues><a:Di splayName> Internet ( Client &am p; Server) capabilit y</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>int ernetClien tServer</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>Not Se lected</b: Value><b:V alue>Yes</ b:Value><b :Value>No< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Intern et (Client ) capabili ty</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>in ternetClie nt</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N ot Selecte d</b:Value ><b:Value> Yes</b:Val ue><b:Valu e>No</b:Va lue></a:At tributeVal ues><a:Dis playName>L ocation ca pability</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>locati on</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N ot Selecte d</b:Value ><b:Value> Yes</b:Val ue><b:Valu e>No</b:Va lue></a:At tributeVal ues><a:Dis playName>M icrophone capability </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Dynamic< /a:Mode><a :Name>micr ophone</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Not Sel ected</b:V alue><b:Va lue>Yes</b :Value><b: Value>No</ b:Value></ a:Attribut eValues><a :DisplayNa me>Music L ibrary cap ability</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>musicLi brary</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>Not Sele cted</b:Va lue><b:Val ue>Yes</b: Value><b:V alue>No</b :Value></a :Attribute Values><a: DisplayNam e>Pictures Library c apability< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Dynamic</ a:Mode><a: Name>pictu reLibrary< /a:Name><a :Type>List </a:Type>< /a:Attribu te><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>Not Selected</ b:Value><b :Value>Yes </b:Value> <b:Value>N o</b:Value ></a:Attri buteValues ><a:Displa yName>Priv ate Networ ks (Client & Ser ver) capab ility</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >privateNe tworkClien tServer</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>Not Se lected</b: Value><b:V alue>Yes</ b:Value><b :Value>No< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Proxim ity capabi lity</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Dyna mic</a:Mod e><a:Name> proximity< /a:Name><a :Type>List </a:Type>< /a:Attribu te><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>Not Selected</ b:Value><b :Value>Yes </b:Value> <b:Value>N o</b:Value ></a:Attri buteValues ><a:Displa yName>Remo vable Stor age capabi lity</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Dyna mic</a:Mod e><a:Name> removableS torage</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Not Sel ected</b:V alue><b:Va lue>Yes</b :Value><b: Value>No</ b:Value></ a:Attribut eValues><a :DisplayNa me>Shared User Certi ficates ca pability</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>shared UserCertif icates</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>Not Sel ected</b:V alue><b:Va lue>Yes</b :Value><b: Value>No</ b:Value></ a:Attribut eValues><a :DisplayNa me>Text Me ssaging ca pability</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>sms</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>Not Se lected</b: Value><b:V alue>Yes</ b:Value><b :Value>No< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Videos Library c apability< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Dynamic</ a:Mode><a: Name>video sLibrary</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Not S elected</b :Value><b: Value>Yes< /b:Value>< b:Value>No </b:Value> </a:Attrib uteValues> <a:Display Name>Webca m capabili ty</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>we bcam</a:Na me><a:Type >List</a:T ype></a:At tribute><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >Managed</ b:Value></ a:Attribut eValues><a :DisplayNa me>Code Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>cod eType</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< /a:Attribu tes><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
32 | A re presentati on of a Wi ndows Stor e process. | |
33 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.Modern </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAARRJ REFUOE99ks FmQ0EUhtOH KCGUUi6hhE ieoVy6CiGr kG3IA2TVB+ hThVLyDN1e SghdZTX5P8 4fc5u5d/H5 58z5z5kzc+ /gYVb/ZydS 6F0+pdTCCc wHUYsvQQPU 8Vb0NjgKir og39vgXWA8 iZWYhBKzT7 6zwUZ47KV4 ER/iOWL2ye MrNriECUbi M9Y0IXYOX7 FBPsFCcPJe UEzMfu8E8C Yw/gqKnkKJ 2Sdvbwsvvg XGLsi3Co0X +X+AUoTy+v 4PXgXX+xFD MRa3Bjlr8R fqvbmgqT+r dZ4X9sGD0p RJH0OJR3ev miODaQQnVq E8MtoUC40M hsKz4GTujh JXxUIjg5kK TmTsXKfFQi NDDg/JJBRz BcX14ApRBW L6a6sYxQAA AABJRU5Erk Jggg==</a: ImageSourc e><a:Image Stream i:n il="true"/ ><a:Name>W indows Sto re Process </a:Name>< a:ParentId >GE.P</a:P arentId><a :Represent ation>Elli pse</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>U nmanaged</ b:Value></ a:Attribut eValues><a :DisplayNa me>Code Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>cod eType</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< /a:Attribu tes><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
34 | A re presentati on of an n etwork pro cess or se rvice. | |
35 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.Win32S ervice</a: Id><a:Imag eLocation> Centered o n stencil< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA BGdBTUEAAL GOfPtRkwAA ACBjSFJNAA CHDwAAjA8A AP1SAACBQA AAfXkAAOmL AAA85QAAGc xzPIV3AAAK OWlDQ1BQaG 90b3Nob3Ag SUNDIHByb2 ZpbGUAAEjH nZZ3VFTXFo fPvXd6oc0w AlKG3rvAAN J7k15FYZgZ YCgDDjM0sS GiAhFFRJoi SFDEgNFQJF ZEsRAUVLAH JAgoMRhFVC xvRtaLrqy8 9/Ly++Osb+ 2z97n77L3P WhcAkqcvl5 cGSwGQyhPw gzyc6RGRUX TsAIABHmCA KQBMVka6X7 B7CBDJy82F niFyAl8EAf B6WLwCcNPQ M4BOB/+fpF npfIHomAAR m7M5GSwRF4 g4JUuQLrbP ipgalyxmGC VmvihBEcuJ OWGRDT77LL KjmNmpPLaI xTmns1PZYu 4V8bZMIUfE iK+ICzO5nC wR3xKxRoow lSviN+LYVA 4zAwAUSWwX cFiJIjYRMY kfEuQi4uUA 4EgJX3HcVy zgZAvEl3JJ S8/hcxMSBX Qdli7d1Nqa QffkZKVwBA LDACYrmcln 013SUtOZvB wAFu/8WTLi 2tJFRbY0tb a0NDQzMv2q UP91829K3N tFehn4uWcQ rf+L7a/80h oAYMyJarPz iy2uCoDOLQ DI3fti0zgA gKSobx3Xv7 oPTTwviQJB uo2xcVZWlh GXwzISF/QP /U+Hv6Gvvm ckPu6P8tBd OfFMYYqALq 4bKy0lTcin Z6QzWRy64Z +H+B8H/nUe BkGceA6fwx NFhImmjMtL ELWbx+YKuG k8Opf3n5r4 D8P+pMW5Fo nS+BFQY4yA 1HUqQH7tBy gKESDR+8Vd /6NvvvgwIH 554SqTi3P/ 7zf9Z8Gl4i WDm/A5ziUo hM4S8jMX98 TPEqABAUgC KpAHykAd6A BDYAasgC1w BG7AG/iDEB AJVgMWSASp gA+yQB7YBA pBMdgJ9oBq UAcaQTNoBc dBJzgFzoNL 4Bq4AW6D+2 AUTIBnYBa8 BgsQBGEhMk SB5CEVSBPS h8wgBmQPuU G+UBAUCcVC CRAPEkJ50G aoGCqDqqF6 qBn6HjoJnY euQIPQXWgM moZ+h97BCE yCqbASrAUb wwzYCfaBQ+ BVcAK8Bs6F C+AdcCXcAB +FO+Dz8DX4 NjwKP4PnEI AQERqiihgi DMQF8UeikH iEj6xHipAK pAFpRbqRPu QmMorMIG9R GBQFRUcZom xRnqhQFAu1 BrUeVYKqRh 1GdaB6UTdR Y6hZ1Ec0Ga 2I1kfboL3Q EegEdBa6EF 2BbkK3oy+i b6Mn0K8xGA wNo42xwnhi IjFJmLWYEs w+TBvmHGYQ M46Zw2Kx8l h9rB3WH8vE CrCF2CrsUe xZ7BB2AvsG R8Sp4Mxw7r goHA+Xj6vA HcGdwQ3hJn ELeCm8Jt4G 749n43Pwpf hGfDf+On4C v0CQJmgT7A ghhCTCJkIl oZVwkfCA8J JIJKoRrYmB RC5xI7GSeI x4mThGfEuS IemRXEjRJC FpB+kQ6Rzp LuklmUzWIj uSo8gC8g5y M/kC+RH5jQ RFwkjCS4It sUGiRqJDYk jiuSReUlPS SXK1ZK5khe QJyeuSM1J4 KS0pFymm1H qpGqmTUiNS c9IUaVNpf+ lU6RLpI9JX pKdksDJaMm 4ybJkCmYMy F2TGKQhFne JCYVE2Uxop FykTVAxVm+ pFTaIWU7+j DlBnZWVkl8 mGyWbL1sie lh2lITQtmh cthVZKO04b pr1borTEaQ lnyfYlrUuG lszLLZVzlO PIFcm1yd2W eydPl3eTT5 bfJd8p/1AB paCnEKiQpb Bf4aLCzFLq UtulrKVFS4 8vvacIK+op BimuVTyo2K 84p6Ss5KGU rlSldEFpRp mm7KicpFyu fEZ5WoWiYq /CVSlXOavy lC5Ld6Kn0C vpvfRZVUVV T1Whar3qgO qCmrZaqFq+ WpvaQ3WCOk M9Xr1cvUd9 VkNFw08jT6 NF454mXpOh mai5V7NPc1 5LWytca6tW p9aUtpy2l3 audov2Ax2y joPOGp0GnV u6GF2GbrLu Pt0berCehV 6iXo3edX1Y 31Kfq79Pf9 AAbWBtwDNo MBgxJBk6GW YathiOGdGM fI3yjTqNnh trGEcZ7zLu M/5oYmGSYt Joct9UxtTb NN+02/R3Mz 0zllmN2S1z srm7+QbzLv MXy/SXcZbt X3bHgmLhZ7 HVosfig6WV Jd+y1XLaSs Mq1qrWaoRB ZQQwShiXrd HWztYbrE9Z v7WxtBHYHL f5zdbQNtn2 iO3Ucu3lnO WNy8ft1OyY dvV2o/Z0+1 j7A/ajDqoO TIcGh8eO6o 5sxybHSSdd pySno07PnU 2c+c7tzvMu Ni7rXM65Iq 4erkWuA24y bqFu1W6P3N XcE9xb3Gc9 LDzWepzzRH v6eO7yHPFS 8mJ5NXvNel t5r/Pu9SH5 BPtU+zz21f Pl+3b7wX7e frv9HqzQXM Fb0ekP/L38 d/s/DNAOWB PwYyAmMCCw JvBJkGlQXl BfMCU4JvhI 8OsQ55DSkP uhOqHC0J4w ybDosOaw+X DX8LLw0Qjj iHUR1yIVIr mRXVHYqLCo pqi5lW4r96 yciLaILowe XqW9KnvVld UKq1NWn46R jGHGnIhFx4 bHHol9z/Rn NjDn4rziau NmWS6svaxn bEd2OXuaY8 cp40zG28WX xU8l2CXsTp hOdEisSJzh unCruS+SPJ PqkuaT/ZMP JX9KCU9pS8 Wlxqae5Mnw knm9acpp2W mD6frphemj a2zW7Fkzy/ fhN2VAGasy ugRU0c9Uv1 BHuEU4lmmf WZP5Jiss60 S2dDYvuz9H L2d7zmSue+ 63a1FrWWt7 8lTzNuWNrX NaV78eWh+3 vmeD+oaCDR MbPTYe3kTY lLzpp3yT/L L8V5vDN3cX KBVsLBjf4r GlpVCikF84 stV2a9021D butoHt5tur tn8sYhddLT Yprih+X8Iq ufqN6TeV33 zaEb9joNSy dP9OzE7ezu FdDrsOl0mX 5ZaN7/bb3V FOLy8qf7Un Zs+VimUVdX sJe4V7Ryt9 K7uqNKp2Vr 2vTqy+XeNc 01arWLu9dn 4fe9/Qfsf9 rXVKdcV17w 5wD9yp96jv aNBqqDiIOZ h58EljWGPf t4xvm5sUmo qbPhziHRo9 HHS4t9mquf mI4pHSFrhF 2DJ9NProje 9cv+tqNWyt b6O1FR8Dx4 THnn4f+/3w cZ/jPScYJ1 p/0Pyhtp3S XtQBdeR0zH Ymdo52RXYN nvQ+2dNt29 3+o9GPh06p nqo5LXu69A zhTMGZT2dz z86dSz83cz 7h/HhPTM/9 CxEXbvUG9g 5c9Ll4+ZL7 pQt9Tn1nL9 tdPnXF5srJ q4yrndcsr3 X0W/S3/2Tx U/uA5UDHda vrXTesb3QP Lh88M+QwdP 6m681Lt7xu Xbu94vbgcO jwnZHokdE7 7DtTd1Puvr iXeW/h/sYH 6AdFD6UeVj xSfNTws+7P baOWo6fHXM f6Hwc/vj/O Gn/2S8Yv7y cKnpCfVEyq TDZPmU2dmn afvvF05dOJ Z+nPFmYKf5 X+tfa5zvMf fnP8rX82Yn biBf/Fp99L Xsq/PPRq2a ueuYC5R69T Xy/MF72Rf3 P4LeNt37vw d5MLWe+x7y s/6H7o/ujz 8cGn1E+f/g UDmPP8usTo 0wAAAAlwSF lzAAAOxAAA DsQBlSsOGw AAANFJREFU OE+t09EGAk EUxvF6lG6j qxQR3cbQbU RERER0FV31 ErEsveI+QN T3X3NYszPs ji5+Zsycvj k7o8Fw5gr5 ZioI+ASLfV QExDa6+l8A Y45kgJO7HG QvD78W1kUD +MFYljLxmE 9lJ83aVsBR LsLTnuXpMW ftKtQkA+yE rR+tA+Z01q xBK+AlJ+E0 RuuAeelH9p IBls7lMfbu YCNruQkXx6 dgLrwKe9Qk A8BJI1mJdc CcEOvCRAPA 6dw4nwJeYS FhXR3Anync 6KoOeAtdZH DlD8vn/L46 Hi6/AAAAAE lFTkSuQmCC </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>Win32 S ervice</a: Name><a:Pa rentId>GE. P</a:Paren tId><a:Rep resentatio n>Ellipse< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Unman aged</b:Va lue></a:At tributeVal ues><a:Dis playName>C ode Type</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>codeTyp e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute></a:A ttributes> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
36 | Deli vers web c ontent to a human us er. | |
37 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.WebApp </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAANFJ REFUOE+t09 EGAkEUxvF6 lG6jqxQR3c bQbURERER0 FV31ErEsve I+QNT3X3NY szPsji5+Zs ycvjk7o8Fw 5gr5ZioI+A SLfVQExDa6 +l8AY45kgJ O7HGQvD78W 1kUD+MFYlj LxmE9lJ83a VsBRLsLTnu XpMWftKtQk A+yErR+tA+ Z01qxBK+Al J+E0RuuAee lH9pIBls7l MfbuYCNruQ kXx6dgLrwK e9QkA8BJI1 mJdcCcEOvC RAPA6dw4nw JeYSFhXR3A nync6KoOeA tdZHDlD8vn /L46Hi6/AA AAAElFTkSu QmCC</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Web Applicati on</a:Name ><a:Parent Id>GE.P</a :ParentId> <a:Represe ntation>El lipse</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >Unmanaged </b:Value> </a:Attrib uteValues> <a:Display Name>Code Type</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Stat ic</a:Mode ><a:Name>c odeType</a :Name><a:T ype>List</ a:Type></a :Attribute ></a:Attri butes><a:A vailableTo BaseModels xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Exter nalStorage .OM"/><a:B ehavior i: nil="true" /><a:Descr iption> | |
38 | Expo ses a prog rammatic i nterface. | |
39 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.WebSvc </a:Id><a: ImageLocat ion>Center ed on sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAANFJ REFUOE+t09 EGAkEUxvF6 lG6jqxQR3c bQbURERER0 FV31ErEsve I+QNT3X3NY szPsji5+Zs ycvjk7o8Fw 5gr5ZioI+A SLfVQExDa6 +l8AY45kgJ O7HGQvD78W 1kUD+MFYlj LxmE9lJ83a VsBRLsLTnu XpMWftKtQk A+yErR+tA+ Z01qxBK+Al J+E0RuuAee lH9pIBls7l MfbuYCNruQ kXx6dgLrwK e9QkA8BJI1 mJdcCcEOvC RAPA6dw4nw JeYSFhXR3A nync6KoOeA tdZHDlD8vn /L46Hi6/AA AAAElFTkSu QmCC</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Web Service</ a:Name><a: ParentId>G E.P</a:Par entId><a:R epresentat ion>Ellips e</a:Repre sentation> <a:Shape i :nil="true "/></a:Ele mentType>< a:ElementT ype><a:IsE xtension>f alse</a:Is Extension> <a:Attribu tes/><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
40 | A vi rtual mach ine runnin g in a Hyp er-V parti tion. | |
41 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.VM</a: Id><a:Imag eLocation> Centered o n stencil< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA BGdBTUEAAL GOfPtRkwAA ACBjSFJNAA CHDwAAjA8A AP1SAACBQA AAfXkAAOmL AAA85QAAGc xzPIV3AAAK OWlDQ1BQaG 90b3Nob3Ag SUNDIHByb2 ZpbGUAAEjH nZZ3VFTXFo fPvXd6oc0w AlKG3rvAAN J7k15FYZgZ YCgDDjM0sS GiAhFFRJoi SFDEgNFQJF ZEsRAUVLAH JAgoMRhFVC xvRtaLrqy8 9/Ly++Osb+ 2z97n77L3P WhcAkqcvl5 cGSwGQyhPw gzyc6RGRUX TsAIABHmCA KQBMVka6X7 B7CBDJy82F niFyAl8EAf B6WLwCcNPQ M4BOB/+fpF npfIHomAAR m7M5GSwRF4 g4JUuQLrbP ipgalyxmGC VmvihBEcuJ OWGRDT77LL KjmNmpPLaI xTmns1PZYu 4V8bZMIUfE iK+ICzO5nC wR3xKxRoow lSviN+LYVA 4zAwAUSWwX cFiJIjYRMY kfEuQi4uUA 4EgJX3HcVy zgZAvEl3JJ S8/hcxMSBX Qdli7d1Nqa QffkZKVwBA LDACYrmcln 013SUtOZvB wAFu/8WTLi 2tJFRbY0tb a0NDQzMv2q UP91829K3N tFehn4uWcQ rf+L7a/80h oAYMyJarPz iy2uCoDOLQ DI3fti0zgA gKSobx3Xv7 oPTTwviQJB uo2xcVZWlh GXwzISF/QP /U+Hv6Gvvm ckPu6P8tBd OfFMYYqALq 4bKy0lTcin Z6QzWRy64Z +H+B8H/nUe BkGceA6fwx NFhImmjMtL ELWbx+YKuG k8Opf3n5r4 D8P+pMW5Fo nS+BFQY4yA 1HUqQH7tBy gKESDR+8Vd /6NvvvgwIH 554SqTi3P/ 7zf9Z8Gl4i WDm/A5ziUo hM4S8jMX98 TPEqABAUgC KpAHykAd6A BDYAasgC1w BG7AG/iDEB AJVgMWSASp gA+yQB7YBA pBMdgJ9oBq UAcaQTNoBc dBJzgFzoNL 4Bq4AW6D+2 AUTIBnYBa8 BgsQBGEhMk SB5CEVSBPS h8wgBmQPuU G+UBAUCcVC CRAPEkJ50G aoGCqDqqF6 qBn6HjoJnY euQIPQXWgM moZ+h97BCE yCqbASrAUb wwzYCfaBQ+ BVcAK8Bs6F C+AdcCXcAB +FO+Dz8DX4 NjwKP4PnEI AQERqiihgi DMQF8UeikH iEj6xHipAK pAFpRbqRPu QmMorMIG9R GBQFRUcZom xRnqhQFAu1 BrUeVYKqRh 1GdaB6UTdR Y6hZ1Ec0Ga 2I1kfboL3Q EegEdBa6EF 2BbkK3oy+i b6Mn0K8xGA wNo42xwnhi IjFJmLWYEs w+TBvmHGYQ M46Zw2Kx8l h9rB3WH8vE CrCF2CrsUe xZ7BB2AvsG R8Sp4Mxw7r goHA+Xj6vA HcGdwQ3hJn ELeCm8Jt4G 749n43Pwpf hGfDf+On4C v0CQJmgT7A ghhCTCJkIl oZVwkfCA8J JIJKoRrYmB RC5xI7GSeI x4mThGfEuS IemRXEjRJC FpB+kQ6Rzp LuklmUzWIj uSo8gC8g5y M/kC+RH5jQ RFwkjCS4It sUGiRqJDYk jiuSReUlPS SXK1ZK5khe QJyeuSM1J4 KS0pFymm1H qpGqmTUiNS c9IUaVNpf+ lU6RLpI9JX pKdksDJaMm 4ybJkCmYMy F2TGKQhFne JCYVE2Uxop FykTVAxVm+ pFTaIWU7+j DlBnZWVkl8 mGyWbL1sie lh2lITQtmh cthVZKO04b pr1borTEaQ lnyfYlrUuG lszLLZVzlO PIFcm1yd2W eydPl3eTT5 bfJd8p/1AB paCnEKiQpb Bf4aLCzFLq UtulrKVFS4 8vvacIK+op BimuVTyo2K 84p6Ss5KGU rlSldEFpRp mm7KicpFyu fEZ5WoWiYq /CVSlXOavy lC5Ld6Kn0C vpvfRZVUVV T1Whar3qgO qCmrZaqFq+ WpvaQ3WCOk M9Xr1cvUd9 VkNFw08jT6 NF454mXpOh mai5V7NPc1 5LWytca6tW p9aUtpy2l3 audov2Ax2y joPOGp0GnV u6GF2GbrLu Pt0berCehV 6iXo3edX1Y 31Kfq79Pf9 AAbWBtwDNo MBgxJBk6GW YathiOGdGM fI3yjTqNnh trGEcZ7zLu M/5oYmGSYt Joct9UxtTb NN+02/R3Mz 0zllmN2S1z srm7+QbzLv MXy/SXcZbt X3bHgmLhZ7 HVosfig6WV Jd+y1XLaSs Mq1qrWaoRB ZQQwShiXrd HWztYbrE9Z v7WxtBHYHL f5zdbQNtn2 iO3Ucu3lnO WNy8ft1OyY dvV2o/Z0+1 j7A/ajDqoO TIcGh8eO6o 5sxybHSSdd pySno07PnU 2c+c7tzvMu Ni7rXM65Iq 4erkWuA24y bqFu1W6P3N XcE9xb3Gc9 LDzWepzzRH v6eO7yHPFS 8mJ5NXvNel t5r/Pu9SH5 BPtU+zz21f Pl+3b7wX7e frv9HqzQXM Fb0ekP/L38 d/s/DNAOWB PwYyAmMCCw JvBJkGlQXl BfMCU4JvhI 8OsQ55DSkP uhOqHC0J4w ybDosOaw+X DX8LLw0Qjj iHUR1yIVIr mRXVHYqLCo pqi5lW4r96 yciLaILowe XqW9KnvVld UKq1NWn46R jGHGnIhFx4 bHHol9z/Rn NjDn4rziau NmWS6svaxn bEd2OXuaY8 cp40zG28WX xU8l2CXsTp hOdEisSJzh unCruS+SPJ PqkuaT/ZMP JX9KCU9pS8 Wlxqae5Mnw knm9acpp2W mD6frphemj a2zW7Fkzy/ fhN2VAGasy ugRU0c9Uv1 BHuEU4lmmf WZP5Jiss60 S2dDYvuz9H L2d7zmSue+ 63a1FrWWt7 8lTzNuWNrX NaV78eWh+3 vmeD+oaCDR MbPTYe3kTY lLzpp3yT/L L8V5vDN3cX KBVsLBjf4r GlpVCikF84 stV2a9021D butoHt5tur tn8sYhddLT Yprih+X8Iq ufqN6TeV33 zaEb9joNSy dP9OzE7ezu FdDrsOl0mX 5ZaN7/bb3V FOLy8qf7Un Zs+VimUVdX sJe4V7Ryt9 K7uqNKp2Vr 2vTqy+XeNc 01arWLu9dn 4fe9/Qfsf9 rXVKdcV17w 5wD9yp96jv aNBqqDiIOZ h58EljWGPf t4xvm5sUmo qbPhziHRo9 HHS4t9mquf mI4pHSFrhF 2DJ9NProje 9cv+tqNWyt b6O1FR8Dx4 THnn4f+/3w cZ/jPScYJ1 p/0Pyhtp3S XtQBdeR0zH Ymdo52RXYN nvQ+2dNt29 3+o9GPh06p nqo5LXu69A zhTMGZT2dz z86dSz83cz 7h/HhPTM/9 CxEXbvUG9g 5c9Ll4+ZL7 pQt9Tn1nL9 tdPnXF5srJ q4yrndcsr3 X0W/S3/2Tx U/uA5UDHda vrXTesb3QP Lh88M+QwdP 6m681Lt7xu Xbu94vbgcO jwnZHokdE7 7DtTd1Puvr iXeW/h/sYH 6AdFD6UeVj xSfNTws+7P baOWo6fHXM f6Hwc/vj/O Gn/2S8Yv7y cKnpCfVEyq TDZPmU2dmn afvvF05dOJ Z+nPFmYKf5 X+tfa5zvMf fnP8rX82Yn biBf/Fp99L Xsq/PPRq2a ueuYC5R69T Xy/MF72Rf3 P4LeNt37vw d5MLWe+x7y s/6H7o/ujz 8cGn1E+f/g UDmPP8usTo 0wAAAAlwSF lzAAAOxAAA DsQBlSsOGw AAARRJREFU OE99ksFmQ0 EUhtOHKCGU Ui6hhEieoV y6CiGrkG3I A2TVB+hThV LyDN1eSghd ZTX5P84fc5 u5d/H558z5 z5kzc+/gYV b/ZydS6F0+ pdTCCcwHUY svQQPU8Vb0 NjgKirog39 vgXWA8iZWY hBKzT76zwU Z47KV4ER/i OWL2yeMrNr iECUbiM9Y0 IXYOX7FBPs FCcPJeUEzM fu8E8CYw/g qKnkKJ2Sdv bwsvvgXGLs i3Co0X+X+A UoTy+v4PXg XX+xFDMRa3 Bjlr8Rfqvb mgqT+rdZ4X 9sGD0pRJH0 OJR3evmiOD aQQnVqE8Mt oUC40MhsKz 4GTujhJXxU Ijg5kKTmTs XKfFQiNDDg /JJBRzBcX1 4ApRBWL6a6 sYxQAAAABJ RU5ErkJggg ==</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Virtu al Machine </a:Name>< a:ParentId >GE.P</a:P arentId><a :Represent ation>Elli pse</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes/><a: AvailableT oBaseModel s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Exte rnalStorag e.OM"/><a: Behavior i :nil="true "/><a:Desc ription> | |
42 | Micr osoft appl ications r unning on operating systems fr om Google or Apple. | |
43 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.P.TMC ore.NonMS< /a:Id><a:I mageLocati on>Centere d on stenc il</a:Imag eLocation> <a:ImageSo urce>iVBOR w0KGgoAAAA NSUhEUgAAA BAAAAAQCAY AAAAf8/9hA AAABGdBTUE AALGOfPtRk wAAACBjSFJ NAACHDwAAj A8AAP1SAAC BQAAAfXkAA OmLAAA85QA AGcxzPIV3A AAKOWlDQ1B QaG90b3Nob 3AgSUNDIHB yb2ZpbGUAA EjHnZZ3VFT XFofPvXd6o c0wAlKG3rv AANJ7k15FY ZgZYCgDDjM 0sSGiAhFFR JoiSFDEgNF QJFZEsRAUV LAHJAgoMRh FVCxvRtaLr qy89/Ly++O sb+2z97n77 L3PWhcAkqc vl5cGSwGQy hPwgzyc6RG RUXTsAIABH mCAKQBMVka 6X7B7CBDJy 82FniFyAl8 EAfB6WLwCc NPQM4BOB/+ fpFnpfIHom AARm7M5GSw RF4g4JUuQL rbPipgalyx mGCVmvihBE cuJOWGRDT7 7LLKjmNmpP LaIxTmns1P ZYu4V8bZMI UfEiK+ICzO 5nCwR3xKxR oowlSviN+L YVA4zAwAUS WwXcFiJIjY RMYkfEuQi4 uUA4EgJX3H cVyzgZAvEl 3JJS8/hcxM SBXQdli7d1 NqaQffkZKV wBALDACYrm cln013SUtO ZvBwAFu/8W TLi2tJFRbY 0tba0NDQzM v2qUP91829 K3NtFehn4u WcQrf+L7a/ 80hoAYMyJa rPziy2uCoD OLQDI3fti0 zgAgKSobx3 Xv7oPTTwvi QJBuo2xcVZ WlhGXwzISF /QP/U+Hv6G vvmckPu6P8 tBdOfFMYYq ALq4bKy0lT cinZ6QzWRy 64Z+H+B8H/ nUeBkGceA6 fwxNFhImmj MtLELWbx+Y KuGk8Opf3n 5r4D8P+pMW 5FonS+BFQY 4yA1HUqQH7 tBygKESDR+ 8Vd/6Nvvvg wIH554SqTi 3P/7zf9Z8G l4iWDm/A5z iUohM4S8jM X98TPEqABA UgCKpAHykA d6ABDYAasg C1wBG7AG/i DEBAJVgMWS ASpgA+yQB7 YBApBMdgJ9 oBqUAcaQTN oBcdBJzgFz oNL4Bq4AW6 D+2AUTIBnY Ba8BgsQBGE hMkSB5CEVS BPSh8wgBmQ PuUG+UBAUC cVCCRAPEkJ 50GaoGCqDq qF6qBn6Hjo JnYeuQIPQX WgMmoZ+h97 BCEyCqbASr AUbwwzYCfa BQ+BVcAK8B s6FC+AdcCX cAB+FO+Dz8 DX4NjwKP4P nEIAQERqii hgiDMQF8Ue ikHiEj6xHi pAKpAFpRbq RPuQmMorMI G9RGBQFRUc ZomxRnqhQF Au1BrUeVYK qRh1GdaB6U TdRY6hZ1Ec 0Ga2I1kfbo L3QEegEdBa 6EF2BbkK3o y+ib6Mn0K8 xGAwNo42xw nhiIjFJmLW YEsw+TBvmH GYQM46Zw2K x8lh9rB3WH 8vECrCF2Cr sUexZ7BB2A vsGR8Sp4Mx w7rgoHA+Xj 6vAHcGdwQ3 hJnELeCm8J t4G749n43P wpfhGfDf+O n4Cv0CQJmg T7AghhCTCJ kIloZVwkfC A8JJIJKoRr YmBRC5xI7G SeIx4mThGf EuSIemRXEj RJCFpB+kQ6 RzpLuklmUz WIjuSo8gC8 g5yM/kC+RH 5jQRFwkjCS 4ItsUGiRqJ DYkjiuSReU lPSSXK1ZK5 kheQJyeuSM 1J4KS0pFym m1HqpGqmTU iNSc9IUaVN pf+lU6RLpI 9JXpKdksDJ aMm4ybJkCm YMyF2TGKQh FneJCYVE2U xopFykTVAx Vm+pFTaIWU 7+jDlBnZWV kl8mGyWbL1 sielh2lITQ tmhcthVZKO 04bpr1borT EaQlnyfYlr UuGlszLLZV zlOPIFcm1y d2WeydPl3e TT5bfJd8p/ 1ABpaCnEKi QpbBf4aLCz FLqUtulrKV FS48vvacIK +opBimuVTy o2K84p6Ss5 KGUrlSldEF pRpmm7Kicp FyufEZ5WoW iYq/CVSlXO avylC5Ld6K n0CvpvfRZV UVVT1Whar3 qgOqCmrZaq Fq+WpvaQ3W COkM9Xr1cv Ud9VkNFw08 jT6NF454mX pOhmai5V7N Pc15LWytca 6tWp9aUtpy 2l3audov2A x2yjoPOGp0 GnVu6GF2Gb rLuPt0berC ehV6iXo3ed X1Y31Kfq79 Pf9AAbWBtw DNoMBgxJBk 6GWYathiOG dGMfI3yjTq NnhtrGEcZ7 zLuM/5oYmG SYtJoct9Ux tTbNN+02/R 3Mz0zllmN2 S1zsrm7+Qb zLvMXy/SXc ZbtX3bHgmL hZ7HVosfig 6WVJd+y1XL aSsMq1qrWa oRBZQQwShi XrdHWztYbr E9Zv7WxtBH YHLf5zdbQN tn2iO3Ucu3 lnOWNy8ft1 OyYdvV2o/Z 0+1j7A/ajD qoOTIcGh8e O6o5sxybHS SddpySno07 PnU2c+c7tz vMuNi7rXM6 5Iq4erkWuA 24ybqFu1W6 P3NXcE9xb3 Gc9LDzWepz zRHv6eO7yH PFS8mJ5NXv Nelt5r/Pu9 SH5BPtU+zz 21fPl+3b7w X7efrv9Hqz QXMFb0ekP/ L38d/s/DNA OWBPwYyAmM CCwJvBJkGl QXlBfMCU4J vhI8OsQ55D SkPuhOqHC0 J4wybDosOa w+XDX8LLw0 QjjiHUR1yI VIrmRXVHYq LCopqi5lW4 r96yciLaIL oweXqW9Knv VldUKq1NWn 46RjGHGnIh Fx4bHHol9z /RnNjDn4rz iauNmWS6sv axnbEd2OXu aY8cp40zG2 8WXxU8l2CX sTphOdEisS JzhunCruS+ SPJPqkuaT/ ZMPJX9KCU9 pS8Wlxqae5 Mnwknm9acp p2WmD6frph emja2zW7Fk zy/fhN2VAG asyugRU0c9 Uv1BHuEU4l mmfWZP5Jis s60S2dDYvu z9HL2d7zmS ue+63a1FrW Wt78lTzNuW NrXNaV78eW h+3vmeD+oa CDRMbPTYe3 kTYlLzpp3y T/LL8V5vDN 3cXKBVsLBj f4rGlpVCik F84stV2a90 21DbutoHt5 turtn8sYhd dLTYprih+X 8IqufqN6Te V33zaEb9jo NSydP9OzE7 ezuFdDrsOl 0mX5ZaN7/b b3VFOLy8qf 7UnZs+VimU VdXsJe4V7R yt9K7uqNKp 2Vr2vTqy+X eNc01arWLu 9dn4fe9/Qf sf9rXVKdcV 17w5wD9yp9 6jvaNBqqDi IOZh58EljW GPft4xvm5s UmoqbPhziH Ro9HHS4t9m qufmI4pHSF rhF2DJ9NPr oje9cv+tqN Wytb6O1FR8 Dx4THnn4f+ /3wcZ/jPSc YJ1p/0Pyht p3SXtQBdeR 0zHYmdo52R XYNnvQ+2dN t293+o9GPh 06pnqo5LXu 69AzhTMGZT 2dzz86dSz8 3cz7h/HhPT M/9CxEXbvU G9g5c9Ll4+ ZL7pQt9Tn1 nL9tdPnXF5 srJq4yrndc sr3X0W/S3/ 2TxU/uA5UD HdavrXTesb 3QPLh88M+Q wdP6m681Lt 7xuXbu94vb gcOjwnZHok dE77DtTd1P uvriXeW/h/ sYH6AdFD6U eVjxSfNTws +7PbaOWo6f HXMf6Hwc/v j/OGn/2S8Y v7ycKnpCfV EyqTDZPmU2 dmnafvvF05 dOJZ+nPFmY Kf5X+tfa5z vMffnP8rX8 2YnbiBf/Fp 99LXsq/PPR q2aueuYC5R 69TXy/MF72 Rf3P4LeNt3 7vwd5MLWe+ x7ys/6H7o/ ujz8cGn1E+ f/gUDmPP8u sTo0wAAAAl wSFlzAAAOx AAADsQBlSs OGwAAARRJR EFUOE99ksF mQ0EUhtOHK CGUUi6hhEi eoVy6CiGrk G3IA2TVB+h ThVLyDN1eS ghdZTX5P84 fc5u5d/H55 8z5z5kzc+/ gYVb/ZydS6 F0+pdTCCcw HUYsvQQPU8 Vb0NjgKiro g39vgXWA8i ZWYhBKzT76 zwUZ47KV4E R/iOWL2yeM rNriECUbiM 9Y0IXYOX7F BPsFCcPJeU EzMfu8E8CY w/gqKnkKJ2 SdvbwsvvgX GLsi3Co0X+ X+AUoTy+v4 PXgXX+xFDM Ra3Bjlr8Rf qvbmgqT+rd Z4X9sGD0pR JH0OJR3evm iODaQQnVqE 8MtoUC40Mh sKz4GTujhJ XxUIjg5kKT mTsXKfFQiN DDg/JJBRzB cX14ApRBWL 6a6sYxQAAA ABJRU5ErkJ ggg==</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>Ap plications Running o n a non Mi crosoft OS </a:Name>< a:ParentId >GE.P</a:P arentId><a :Represent ation>Elli pse</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>C ode</b:Val ue></a:Att ributeValu es><a:Disp layName>Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>typ e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute></a:A ttributes> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
44 | A re presentati on of an e xternal We b browser. | |
45 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.Brows er</a:Id>< a:ImageLoc ation>Lowe r right of stencil</ a:ImageLoc ation><a:I mageSource >iVBORw0KG goAAAANSUh EUgAAABAAA AAQCAYAAAA f8/9hAAAAB GdBTUEAALG OfPtRkwAAA CBjSFJNAAC HDwAAjA8AA P1SAACBQAA AfXkAAOmLA AA85QAAGcx zPIV3AAAKO WlDQ1BQaG9 0b3Nob3AgS UNDIHByb2Z pbGUAAEjHn ZZ3VFTXFof PvXd6oc0wA lKG3rvAANJ 7k15FYZgZY CgDDjM0sSG iAhFFRJoiS FDEgNFQJFZ EsRAUVLAHJ AgoMRhFVCx vRtaLrqy89 /Ly++Osb+2 z97n77L3PW hcAkqcvl5c GSwGQyhPwg zyc6RGRUXT sAIABHmCAK QBMVka6X7B 7CBDJy82Fn iFyAl8EAfB 6WLwCcNPQM 4BOB/+fpFn pfIHomAARm 7M5GSwRF4g 4JUuQLrbPi pgalyxmGCV mvihBEcuJO WGRDT77LLK jmNmpPLaIx Tmns1PZYu4 V8bZMIUfEi K+ICzO5nCw R3xKxRoowl SviN+LYVA4 zAwAUSWwXc FiJIjYRMYk fEuQi4uUA4 EgJX3HcVyz gZAvEl3JJS 8/hcxMSBXQ dli7d1NqaQ ffkZKVwBAL DACYrmcln0 13SUtOZvBw AFu/8WTLi2 tJFRbY0tba 0NDQzMv2qU P91829K3Nt Fehn4uWcQr f+L7a/80ho AYMyJarPzi y2uCoDOLQD I3fti0zgAg KSobx3Xv7o PTTwviQJBu o2xcVZWlhG XwzISF/QP/ U+Hv6Gvvmc kPu6P8tBdO fFMYYqALq4 bKy0lTcinZ 6QzWRy64Z+ H+B8H/nUeB kGceA6fwxN FhImmjMtLE LWbx+YKuGk 8Opf3n5r4D 8P+pMW5Fon S+BFQY4yA1 HUqQH7tByg KESDR+8Vd/ 6NvvvgwIH5 54SqTi3P/7 zf9Z8Gl4iW Dm/A5ziUoh M4S8jMX98T PEqABAUgCK pAHykAd6AB DYAasgC1wB G7AG/iDEBA JVgMWSASpg A+yQB7YBAp BMdgJ9oBqU AcaQTNoBcd BJzgFzoNL4 Bq4AW6D+2A UTIBnYBa8B gsQBGEhMkS B5CEVSBPSh 8wgBmQPuUG +UBAUCcVCC RAPEkJ50Ga oGCqDqqF6q Bn6HjoJnYe uQIPQXWgMm oZ+h97BCEy CqbASrAUbw wzYCfaBQ+B VcAK8Bs6FC +AdcCXcAB+ FO+Dz8DX4N jwKP4PnEIA QERqiihgiD MQF8UeikHi Ej6xHipAKp AFpRbqRPuQ mMorMIG9RG BQFRUcZomx RnqhQFAu1B rUeVYKqRh1 GdaB6UTdRY 6hZ1Ec0Ga2 I1kfboL3QE egEdBa6EF2 BbkK3oy+ib 6Mn0K8xGAw No42xwnhiI jFJmLWYEsw +TBvmHGYQM 46Zw2Kx8lh 9rB3WH8vEC rCF2CrsUex Z7BB2AvsGR 8Sp4Mxw7rg oHA+Xj6vAH cGdwQ3hJnE LeCm8Jt4G7 49n43Pwpfh GfDf+On4Cv 0CQJmgT7Ag hhCTCJkIlo ZVwkfCA8JJ IJKoRrYmBR C5xI7GSeIx 4mThGfEuSI emRXEjRJCF pB+kQ6RzpL uklmUzWIju So8gC8g5yM /kC+RH5jQR FwkjCS4Its UGiRqJDYkj iuSReUlPSS XK1ZK5kheQ JyeuSM1J4K S0pFymm1Hq pGqmTUiNSc 9IUaVNpf+l U6RLpI9JXp KdksDJaMm4 ybJkCmYMyF 2TGKQhFneJ CYVE2UxopF ykTVAxVm+p FTaIWU7+jD lBnZWVkl8m GyWbL1siel h2lITQtmhc thVZKO04bp r1borTEaQl nyfYlrUuGl szLLZVzlOP IFcm1yd2We ydPl3eTT5b fJd8p/1ABp aCnEKiQpbB f4aLCzFLqU tulrKVFS48 vvacIK+opB imuVTyo2K8 4p6Ss5KGUr lSldEFpRpm m7KicpFyuf EZ5WoWiYq/ CVSlXOavyl C5Ld6Kn0Cv pvfRZVUVVT 1Whar3qgOq CmrZaqFq+W pvaQ3WCOkM 9Xr1cvUd9V kNFw08jT6N F454mXpOhm ai5V7NPc15 LWytca6tWp 9aUtpy2l3a udov2Ax2yj oPOGp0GnVu 6GF2GbrLuP t0berCehV6 iXo3edX1Y3 1Kfq79Pf9A AbWBtwDNoM BgxJBk6GWY athiOGdGMf I3yjTqNnht rGEcZ7zLuM /5oYmGSYtJ oct9UxtTbN N+02/R3Mz0 zllmN2S1zs rm7+QbzLvM Xy/SXcZbtX 3bHgmLhZ7H Vosfig6WVJ d+y1XLaSsM q1qrWaoRBZ QQwShiXrdH WztYbrE9Zv 7WxtBHYHLf 5zdbQNtn2i O3Ucu3lnOW Ny8ft1OyYd vV2o/Z0+1j 7A/ajDqoOT IcGh8eO6o5 sxybHSSddp ySno07PnU2 c+c7tzvMuN i7rXM65Iq4 erkWuA24yb qFu1W6P3NX cE9xb3Gc9L DzWepzzRHv 6eO7yHPFS8 mJ5NXvNelt 5r/Pu9SH5B PtU+zz21fP l+3b7wX7ef rv9HqzQXMF b0ekP/L38d /s/DNAOWBP wYyAmMCCwJ vBJkGlQXlB fMCU4JvhI8 OsQ55DSkPu hOqHC0J4wy bDosOaw+XD X8LLw0Qjji HUR1yIVIrm RXVHYqLCop qi5lW4r96y ciLaILoweX qW9KnvVldU Kq1NWn46Rj GHGnIhFx4b HHol9z/RnN jDn4rziauN mWS6svaxnb Ed2OXuaY8c p40zG28WXx U8l2CXsTph OdEisSJzhu nCruS+SPJP qkuaT/ZMPJ X9KCU9pS8W lxqae5Mnwk nm9acpp2Wm D6frphemja 2zW7Fkzy/f hN2VAGasyu gRU0c9Uv1B HuEU4lmmfW ZP5Jiss60S 2dDYvuz9HL 2d7zmSue+6 3a1FrWWt78 lTzNuWNrXN aV78eWh+3v meD+oaCDRM bPTYe3kTYl Lzpp3yT/LL 8V5vDN3cXK BVsLBjf4rG lpVCikF84s tV2a9021Db utoHt5turt n8sYhddLTY prih+X8Iqu fqN6TeV33z aEb9joNSyd P9OzE7ezuF dDrsOl0mX5 ZaN7/bb3VF OLy8qf7UnZ s+VimUVdXs Je4V7Ryt9K 7uqNKp2Vr2 vTqy+XeNc0 1arWLu9dn4 fe9/Qfsf9r XVKdcV17w5 wD9yp96jva NBqqDiIOZh 58EljWGPft 4xvm5sUmoq bPhziHRo9H HS4t9mqufm I4pHSFrhF2 DJ9NProje9 cv+tqNWytb 6O1FR8Dx4T Hnn4f+/3wc Z/jPScYJ1p /0Pyhtp3SX tQBdeR0zHY mdo52RXYNn vQ+2dNt293 +o9GPh06pn qo5LXu69Az hTMGZT2dzz 86dSz83cz7 h/HhPTM/9C xEXbvUG9g5 c9Ll4+ZL7p Qt9Tn1nL9t dPnXF5srJq 4yrndcsr3X 0W/S3/2TxU /uA5UDHdav rXTesb3QPL h88M+QwdP6 m681Lt7xuX bu94vbgcOj wnZHokdE77 DtTd1Puvri XeW/h/sYH6 AdFD6UeVjx SfNTws+7Pb aOWo6fHXMf 6Hwc/vj/OG n/2S8Yv7yc KnpCfVEyqT DZPmU2dmna fvvF05dOJZ +nPFmYKf5X +tfa5zvMff nP8rX82Ynb iBf/Fp99LX sq/PPRq2au euYC5R69TX y/MF72Rf3P 4LeNt37vwd 5MLWe+x7ys /6H7o/ujz8 cGn1E+f/gU DmPP8usTo0 wAAAAlwSFl zAAAOxAAAD sQBlSsOGwA AAMRJREFUO E9j+P//PwO jqfd/NGwPE kfH2NSBJUo mzCmGCTpnV k1rmbdCHl0 zLnVgCZggD PPaBzuha8a lDquEbkSWD 5C+jyYuj8Y Hq8NnAIqYu Fu0K7oY2AA gA90mkjCG7 aRinAaAQhk bGx3jNMA1u zoMGD6uUCy HTQ0I4zQAF ECgAIZhbGp AeJAYYJFYt AiUTEE4sbG /HiSGzQBs6 hi4bYNegBj oOKS8TQ/ZA FzqQJI2QAw LbWTMAcRwA 4AYqzpkBWT g/wwA3lTsA WB+hJkAAAA ASUVORK5CY II=</a:Ima geSource>< a:ImageStr eam i:nil= "true"/><a :Name>Brow ser</a:Nam e><a:Paren tId>GE.EI< /a:ParentI d><a:Repre sentation> Rectangle< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s/><a:Avai lableToBas eModels xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.External Storage.OM "/><a:Beha vior i:nil ="true"/>< a:Descript ion> | |
46 | A re presentati on of an e xternal au thorizatio n provider . | |
47 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.AuthP rovider</a :Id><a:Ima geLocation >Lower rig ht of sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAATpJ REFUOE9j+P //PwZmNPWu B+L7QPwfit 8D8Xwg5kdX i8IBYajC/0 YxeXNLJswp BmG/osYOFn PfT0xmPhfQ DUHXHA/SDN IE5CsBsSAU S529fseH1c LvM9CghSC1 MIxiALuV/x XVoJSdQDZI E4ocELOAXA KyANkVKIpA kuGVHfHIYs h47sZd6iA1 vPbBTjAxFA UgSd2ILB9k MWRsnlAojK 4GRYGAY9gd LpvApchiyJ jTOjAJZEDL vBXyMDEUBW 45NU0gBUCM 4Q2gmD6zuc 9HaBixwMRR FAGxFEgB1B CU6AJG4Qd+ h9DbO0+cM0 cWhzOQsDbI AJBzYWJAvj xILLSirQzI h9sOwnAGMo a6AAObxhX4 o6tF4SBhVx wYI32gcJAx FhfYY1OHIY CECdoOwhgC yJiQ7SCMVZ B4/J8BAHcP i99NNItPAA AAAElFTkSu QmCC</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Aut horization Provider< /a:Name><a :ParentId> GE.EI</a:P arentId><a :Represent ation>Rect angle</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >Code</b:V alue></a:A ttributeVa lues><a:Di splayName> Type</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Stat ic</a:Mode ><a:Name>t ype</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute></a :Attribute s><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
48 | A re presentati on of an e xternal We b applicat ion (porta l, front e d, etc.). | |
49 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.WebAp p</a:Id><a :ImageLoca tion>Lower right of stencil</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGO fPtRkwAAAC BjSFJNAACH DwAAjA8AAP 1SAACBQAAA fXkAAOmLAA A85QAAGcxz PIV3AAAKOW lDQ1BQaG90 b3Nob3AgSU NDIHByb2Zp bGUAAEjHnZ Z3VFTXFofP vXd6oc0wAl KG3rvAANJ7 k15FYZgZYC gDDjM0sSGi AhFFRJoiSF DEgNFQJFZE sRAUVLAHJA goMRhFVCxv RtaLrqy89/ Ly++Osb+2z 97n77L3PWh cAkqcvl5cG SwGQyhPwgz yc6RGRUXTs AIABHmCAKQ BMVka6X7B7 CBDJy82Fni FyAl8EAfB6 WLwCcNPQM4 BOB/+fpFnp fIHomAARm7 M5GSwRF4g4 JUuQLrbPip galyxmGCVm vihBEcuJOW GRDT77LLKj mNmpPLaIxT mns1PZYu4V 8bZMIUfEiK +ICzO5nCwR 3xKxRoowlS viN+LYVA4z AwAUSWwXcF iJIjYRMYkf EuQi4uUA4E gJX3HcVyzg ZAvEl3JJS8 /hcxMSBXQd li7d1NqaQf fkZKVwBALD ACYrmcln01 3SUtOZvBwA Fu/8WTLi2t JFRbY0tba0 NDQzMv2qUP 91829K3NtF ehn4uWcQrf +L7a/80hoA YMyJarPziy 2uCoDOLQDI 3fti0zgAgK Sobx3Xv7oP TTwviQJBuo 2xcVZWlhGX wzISF/QP/U +Hv6Gvvmck Pu6P8tBdOf FMYYqALq4b Ky0lTcinZ6 QzWRy64Z+H +B8H/nUeBk GceA6fwxNF hImmjMtLEL Wbx+YKuGk8 Opf3n5r4D8 P+pMW5FonS +BFQY4yA1H UqQH7tBygK ESDR+8Vd/6 NvvvgwIH55 4SqTi3P/7z f9Z8Gl4iWD m/A5ziUohM 4S8jMX98TP EqABAUgCKp AHykAd6ABD YAasgC1wBG 7AG/iDEBAJ VgMWSASpgA +yQB7YBApB MdgJ9oBqUA caQTNoBcdB JzgFzoNL4B q4AW6D+2AU TIBnYBa8Bg sQBGEhMkSB 5CEVSBPSh8 wgBmQPuUG+ UBAUCcVCCR APEkJ50Gao GCqDqqF6qB n6HjoJnYeu QIPQXWgMmo Z+h97BCEyC qbASrAUbww zYCfaBQ+BV cAK8Bs6FC+ AdcCXcAB+F O+Dz8DX4Nj wKP4PnEIAQ ERqiihgiDM QF8UeikHiE j6xHipAKpA FpRbqRPuQm MorMIG9RGB QFRUcZomxR nqhQFAu1Br UeVYKqRh1G daB6UTdRY6 hZ1Ec0Ga2I 1kfboL3QEe gEdBa6EF2B bkK3oy+ib6 Mn0K8xGAwN o42xwnhiIj FJmLWYEsw+ TBvmHGYQM4 6Zw2Kx8lh9 rB3WH8vECr CF2CrsUexZ 7BB2AvsGR8 Sp4Mxw7rgo HA+Xj6vAHc GdwQ3hJnEL eCm8Jt4G74 9n43PwpfhG fDf+On4Cv0 CQJmgT7Agh hCTCJkIloZ VwkfCA8JJI JKoRrYmBRC 5xI7GSeIx4 mThGfEuSIe mRXEjRJCFp B+kQ6RzpLu klmUzWIjuS o8gC8g5yM/ kC+RH5jQRF wkjCS4ItsU GiRqJDYkji uSReUlPSSX K1ZK5kheQJ yeuSM1J4KS 0pFymm1Hqp GqmTUiNSc9 IUaVNpf+lU 6RLpI9JXpK dksDJaMm4y bJkCmYMyF2 TGKQhFneJC YVE2UxopFy kTVAxVm+pF TaIWU7+jDl BnZWVkl8mG yWbL1sielh 2lITQtmhct hVZKO04bpr 1borTEaQln yfYlrUuGls zLLZVzlOPI Fcm1yd2Wey dPl3eTT5bf Jd8p/1ABpa CnEKiQpbBf 4aLCzFLqUt ulrKVFS48v vacIK+opBi muVTyo2K84 p6Ss5KGUrl SldEFpRpmm 7KicpFyufE Z5WoWiYq/C VSlXOavylC 5Ld6Kn0Cvp vfRZVUVVT1 Whar3qgOqC mrZaqFq+Wp vaQ3WCOkM9 Xr1cvUd9Vk NFw08jT6NF 454mXpOhma i5V7NPc15L Wytca6tWp9 aUtpy2l3au dov2Ax2yjo POGp0GnVu6 GF2GbrLuPt 0berCehV6i Xo3edX1Y31 Kfq79Pf9AA bWBtwDNoMB gxJBk6GWYa thiOGdGMfI 3yjTqNnhtr GEcZ7zLuM/ 5oYmGSYtJo ct9UxtTbNN +02/R3Mz0z llmN2S1zsr m7+QbzLvMX y/SXcZbtX3 bHgmLhZ7HV osfig6WVJd +y1XLaSsMq 1qrWaoRBZQ QwShiXrdHW ztYbrE9Zv7 WxtBHYHLf5 zdbQNtn2iO 3Ucu3lnOWN y8ft1OyYdv V2o/Z0+1j7 A/ajDqoOTI cGh8eO6o5s xybHSSddpy Sno07PnU2c +c7tzvMuNi 7rXM65Iq4e rkWuA24ybq Fu1W6P3NXc E9xb3Gc9LD zWepzzRHv6 eO7yHPFS8m J5NXvNelt5 r/Pu9SH5BP tU+zz21fPl +3b7wX7efr v9HqzQXMFb 0ekP/L38d/ s/DNAOWBPw YyAmMCCwJv BJkGlQXlBf MCU4JvhI8O sQ55DSkPuh OqHC0J4wyb DosOaw+XDX 8LLw0QjjiH UR1yIVIrmR XVHYqLCopq i5lW4r96yc iLaILoweXq W9KnvVldUK q1NWn46RjG HGnIhFx4bH Hol9z/RnNj Dn4rziauNm WS6svaxnbE d2OXuaY8cp 40zG28WXxU 8l2CXsTphO dEisSJzhun CruS+SPJPq kuaT/ZMPJX 9KCU9pS8Wl xqae5Mnwkn m9acpp2WmD 6frphemja2 zW7Fkzy/fh N2VAGasyug RU0c9Uv1BH uEU4lmmfWZ P5Jiss60S2 dDYvuz9HL2 d7zmSue+63 a1FrWWt78l TzNuWNrXNa V78eWh+3vm eD+oaCDRMb PTYe3kTYlL zpp3yT/LL8 V5vDN3cXKB VsLBjf4rGl pVCikF84st V2a9021Dbu toHt5turtn 8sYhddLTYp rih+X8Iquf qN6TeV33za Eb9joNSydP 9OzE7ezuFd DrsOl0mX5Z aN7/bb3VFO Ly8qf7UnZs +VimUVdXsJ e4V7Ryt9K7 uqNKp2Vr2v Tqy+XeNc01 arWLu9dn4f e9/Qfsf9rX VKdcV17w5w D9yp96jvaN BqqDiIOZh5 8EljWGPft4 xvm5sUmoqb PhziHRo9HH S4t9mqufmI 4pHSFrhF2D J9NProje9c v+tqNWytb6 O1FR8Dx4TH nn4f+/3wcZ /jPScYJ1p/ 0Pyhtp3SXt QBdeR0zHYm do52RXYNnv Q+2dNt293+ o9GPh06pnq o5LXu69Azh TMGZT2dzz8 6dSz83cz7h /HhPTM/9Cx EXbvUG9g5c 9Ll4+ZL7pQ t9Tn1nL9td PnXF5srJq4 yrndcsr3X0 W/S3/2TxU/ uA5UDHdavr XTesb3QPLh 88M+QwdP6m 681Lt7xuXb u94vbgcOjw nZHokdE77D tTd1PuvriX eW/h/sYH6A dFD6UeVjxS fNTws+7Pba OWo6fHXMf6 Hwc/vj/OGn /2S8Yv7ycK npCfVEyqTD ZPmU2dmnaf vvF05dOJZ+ nPFmYKf5X+ tfa5zvMffn P8rX82Ynbi Bf/Fp99LXs q/PPRq2aue uYC5R69TXy /MF72Rf3P4 LeNt37vwd5 MLWe+x7ys/ 6H7o/ujz8c Gn1E+f/gUD mPP8usTo0w AAAAlwSFlz AAAOxAAADs QBlSsOGwAA AIBJREFUOE 9j+P//PwOj qXc8EP8nEc 8H6QUbwGzu 8xGLAmKwPs wFYAHnzKpp JRPmFBPCMP UqgSmeKAa4 ZleHAfmChD BMvW5Elg+K ASABEJ8QHj Vg1AAQxmkA qRhuAKuF32 dsCmB5A5sc CNuklNqCDf ArauzApgAf Vg1K2fn//3 9eAIdsIEry 0cBoAAAAAE lFTkSuQmCC </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>Externa l Web Appl ication</a :Name><a:P arentId>GE .EI</a:Par entId><a:R epresentat ion>Rectan gle</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>C ode</b:Val ue></a:Att ributeValu es><a:Disp layName>Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>typ e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute></a:A ttributes> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
50 | A re presentati on of an e xternal We b service. | |
51 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.WebSv c</a:Id><a :ImageLoca tion>Lower right of stencil</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGO fPtRkwAAAC BjSFJNAACH DwAAjA8AAP 1SAACBQAAA fXkAAOmLAA A85QAAGcxz PIV3AAAKOW lDQ1BQaG90 b3Nob3AgSU NDIHByb2Zp bGUAAEjHnZ Z3VFTXFofP vXd6oc0wAl KG3rvAANJ7 k15FYZgZYC gDDjM0sSGi AhFFRJoiSF DEgNFQJFZE sRAUVLAHJA goMRhFVCxv RtaLrqy89/ Ly++Osb+2z 97n77L3PWh cAkqcvl5cG SwGQyhPwgz yc6RGRUXTs AIABHmCAKQ BMVka6X7B7 CBDJy82Fni FyAl8EAfB6 WLwCcNPQM4 BOB/+fpFnp fIHomAARm7 M5GSwRF4g4 JUuQLrbPip galyxmGCVm vihBEcuJOW GRDT77LLKj mNmpPLaIxT mns1PZYu4V 8bZMIUfEiK +ICzO5nCwR 3xKxRoowlS viN+LYVA4z AwAUSWwXcF iJIjYRMYkf EuQi4uUA4E gJX3HcVyzg ZAvEl3JJS8 /hcxMSBXQd li7d1NqaQf fkZKVwBALD ACYrmcln01 3SUtOZvBwA Fu/8WTLi2t JFRbY0tba0 NDQzMv2qUP 91829K3NtF ehn4uWcQrf +L7a/80hoA YMyJarPziy 2uCoDOLQDI 3fti0zgAgK Sobx3Xv7oP TTwviQJBuo 2xcVZWlhGX wzISF/QP/U +Hv6Gvvmck Pu6P8tBdOf FMYYqALq4b Ky0lTcinZ6 QzWRy64Z+H +B8H/nUeBk GceA6fwxNF hImmjMtLEL Wbx+YKuGk8 Opf3n5r4D8 P+pMW5FonS +BFQY4yA1H UqQH7tBygK ESDR+8Vd/6 NvvvgwIH55 4SqTi3P/7z f9Z8Gl4iWD m/A5ziUohM 4S8jMX98TP EqABAUgCKp AHykAd6ABD YAasgC1wBG 7AG/iDEBAJ VgMWSASpgA +yQB7YBApB MdgJ9oBqUA caQTNoBcdB JzgFzoNL4B q4AW6D+2AU TIBnYBa8Bg sQBGEhMkSB 5CEVSBPSh8 wgBmQPuUG+ UBAUCcVCCR APEkJ50Gao GCqDqqF6qB n6HjoJnYeu QIPQXWgMmo Z+h97BCEyC qbASrAUbww zYCfaBQ+BV cAK8Bs6FC+ AdcCXcAB+F O+Dz8DX4Nj wKP4PnEIAQ ERqiihgiDM QF8UeikHiE j6xHipAKpA FpRbqRPuQm MorMIG9RGB QFRUcZomxR nqhQFAu1Br UeVYKqRh1G daB6UTdRY6 hZ1Ec0Ga2I 1kfboL3QEe gEdBa6EF2B bkK3oy+ib6 Mn0K8xGAwN o42xwnhiIj FJmLWYEsw+ TBvmHGYQM4 6Zw2Kx8lh9 rB3WH8vECr CF2CrsUexZ 7BB2AvsGR8 Sp4Mxw7rgo HA+Xj6vAHc GdwQ3hJnEL eCm8Jt4G74 9n43PwpfhG fDf+On4Cv0 CQJmgT7Agh hCTCJkIloZ VwkfCA8JJI JKoRrYmBRC 5xI7GSeIx4 mThGfEuSIe mRXEjRJCFp B+kQ6RzpLu klmUzWIjuS o8gC8g5yM/ kC+RH5jQRF wkjCS4ItsU GiRqJDYkji uSReUlPSSX K1ZK5kheQJ yeuSM1J4KS 0pFymm1Hqp GqmTUiNSc9 IUaVNpf+lU 6RLpI9JXpK dksDJaMm4y bJkCmYMyF2 TGKQhFneJC YVE2UxopFy kTVAxVm+pF TaIWU7+jDl BnZWVkl8mG yWbL1sielh 2lITQtmhct hVZKO04bpr 1borTEaQln yfYlrUuGls zLLZVzlOPI Fcm1yd2Wey dPl3eTT5bf Jd8p/1ABpa CnEKiQpbBf 4aLCzFLqUt ulrKVFS48v vacIK+opBi muVTyo2K84 p6Ss5KGUrl SldEFpRpmm 7KicpFyufE Z5WoWiYq/C VSlXOavylC 5Ld6Kn0Cvp vfRZVUVVT1 Whar3qgOqC mrZaqFq+Wp vaQ3WCOkM9 Xr1cvUd9Vk NFw08jT6NF 454mXpOhma i5V7NPc15L Wytca6tWp9 aUtpy2l3au dov2Ax2yjo POGp0GnVu6 GF2GbrLuPt 0berCehV6i Xo3edX1Y31 Kfq79Pf9AA bWBtwDNoMB gxJBk6GWYa thiOGdGMfI 3yjTqNnhtr GEcZ7zLuM/ 5oYmGSYtJo ct9UxtTbNN +02/R3Mz0z llmN2S1zsr m7+QbzLvMX y/SXcZbtX3 bHgmLhZ7HV osfig6WVJd +y1XLaSsMq 1qrWaoRBZQ QwShiXrdHW ztYbrE9Zv7 WxtBHYHLf5 zdbQNtn2iO 3Ucu3lnOWN y8ft1OyYdv V2o/Z0+1j7 A/ajDqoOTI cGh8eO6o5s xybHSSddpy Sno07PnU2c +c7tzvMuNi 7rXM65Iq4e rkWuA24ybq Fu1W6P3NXc E9xb3Gc9LD zWepzzRHv6 eO7yHPFS8m J5NXvNelt5 r/Pu9SH5BP tU+zz21fPl +3b7wX7efr v9HqzQXMFb 0ekP/L38d/ s/DNAOWBPw YyAmMCCwJv BJkGlQXlBf MCU4JvhI8O sQ55DSkPuh OqHC0J4wyb DosOaw+XDX 8LLw0QjjiH UR1yIVIrmR XVHYqLCopq i5lW4r96yc iLaILoweXq W9KnvVldUK q1NWn46RjG HGnIhFx4bH Hol9z/RnNj Dn4rziauNm WS6svaxnbE d2OXuaY8cp 40zG28WXxU 8l2CXsTphO dEisSJzhun CruS+SPJPq kuaT/ZMPJX 9KCU9pS8Wl xqae5Mnwkn m9acpp2WmD 6frphemja2 zW7Fkzy/fh N2VAGasyug RU0c9Uv1BH uEU4lmmfWZ P5Jiss60S2 dDYvuz9HL2 d7zmSue+63 a1FrWWt78l TzNuWNrXNa V78eWh+3vm eD+oaCDRMb PTYe3kTYlL zpp3yT/LL8 V5vDN3cXKB VsLBjf4rGl pVCikF84st V2a9021Dbu toHt5turtn 8sYhddLTYp rih+X8Iquf qN6TeV33za Eb9joNSydP 9OzE7ezuFd DrsOl0mX5Z aN7/bb3VFO Ly8qf7UnZs +VimUVdXsJ e4V7Ryt9K7 uqNKp2Vr2v Tqy+XeNc01 arWLu9dn4f e9/Qfsf9rX VKdcV17w5w D9yp96jvaN BqqDiIOZh5 8EljWGPft4 xvm5sUmoqb PhziHRo9HH S4t9mqufmI 4pHSFrhF2D J9NProje9c v+tqNWytb6 O1FR8Dx4TH nn4f+/3wcZ /jPScYJ1p/ 0Pyhtp3SXt QBdeR0zHYm do52RXYNnv Q+2dNt293+ o9GPh06pnq o5LXu69Azh TMGZT2dzz8 6dSz83cz7h /HhPTM/9Cx EXbvUG9g5c 9Ll4+ZL7pQ t9Tn1nL9td PnXF5srJq4 yrndcsr3X0 W/S3/2TxU/ uA5UDHdavr XTesb3QPLh 88M+QwdP6m 681Lt7xuXb u94vbgcOjw nZHokdE77D tTd1PuvriX eW/h/sYH6A dFD6UeVjxS fNTws+7Pba OWo6fHXMf6 Hwc/vj/OGn /2S8Yv7ycK npCfVEyqTD ZPmU2dmnaf vvF05dOJZ+ nPFmYKf5X+ tfa5zvMffn P8rX82Ynbi Bf/Fp99LXs q/PPRq2aue uYC5R69TXy /MF72Rf3P4 LeNt37vwd5 MLWe+x7ys/ 6H7o/ujz8c Gn1E+f/gUD mPP8usTo0w AAAAlwSFlz AAAOxAAADs QBlSsOGwAA AJ5JREFUOE 9j+P//Pxgz mnr/JwejGO CcWTWtZMKc YmIxhgGu2d VhQLYgsRjD AN2ILB8Ynx gMNgBEYMH2 2DSgY5BarA YQ6xKQWjAB CjwBx7A7qk EpO8kyAB3T 3wDk+Ec2iB iM1QW4DMSW 0LC6ADlBIR uALaERDAOL xKJFMBxS3q YHE4dhnAZg E0fC8IQGIl yxYJDzsInD MEgebgAF+D 8DAHhvQ2cW Cf/0AAAAAE lFTkSuQmCC </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>Externa l Web Serv ice</a:Nam e><a:Paren tId>GE.EI< /a:ParentI d><a:Repre sentation> Rectangle< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Human </b:Value> </a:Attrib uteValues> <a:Display Name>Type< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Static</a :Mode><a:N ame>type</ a:Name><a: Type>List< /a:Type></ a:Attribut e></a:Attr ibutes><a: AvailableT oBaseModel s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Exte rnalStorag e.OM"/><a: Behavior i :nil="true "/><a:Desc ription> | |
52 | A re presentati on of a us er. | |
53 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.User< /a:Id><a:I mageLocati on>Lower r ight of st encil</a:I mageLocati on><a:Imag eSource>iV BORw0KGgoA AAANSUhEUg AAABAAAAAQ CAYAAAAf8/ 9hAAAABGdB TUEAALGOfP tRkwAAACBj SFJNAACHDw AAjA8AAP1S AACBQAAAfX kAAOmLAAA8 5QAAGcxzPI V3AAAKOWlD Q1BQaG90b3 Nob3AgSUND IHByb2ZpbG UAAEjHnZZ3 VFTXFofPvX d6oc0wAlKG 3rvAANJ7k1 5FYZgZYCgD DjM0sSGiAh FFRJoiSFDE gNFQJFZEsR AUVLAHJAgo MRhFVCxvRt aLrqy89/Ly ++Osb+2z97 n77L3PWhcA kqcvl5cGSw GQyhPwgzyc 6RGRUXTsAI ABHmCAKQBM Vka6X7B7CB DJy82FniFy Al8EAfB6WL wCcNPQM4BO B/+fpFnpfI HomAARm7M5 GSwRF4g4JU uQLrbPipga lyxmGCVmvi hBEcuJOWGR DT77LLKjmN mpPLaIxTmn s1PZYu4V8b ZMIUfEiK+I CzO5nCwR3x KxRoowlSvi N+LYVA4zAw AUSWwXcFiJ IjYRMYkfEu Qi4uUA4EgJ X3HcVyzgZA vEl3JJS8/h cxMSBXQdli 7d1NqaQffk ZKVwBALDAC Yrmcln013S UtOZvBwAFu /8WTLi2tJF RbY0tba0ND QzMv2qUP91 829K3NtFeh n4uWcQrf+L 7a/80hoAYM yJarPziy2u CoDOLQDI3f ti0zgAgKSo bx3Xv7oPTT wviQJBuo2x cVZWlhGXwz ISF/QP/U+H v6GvvmckPu 6P8tBdOfFM YYqALq4bKy 0lTcinZ6Qz WRy64Z+H+B 8H/nUeBkGc eA6fwxNFhI mmjMtLELWb x+YKuGk8Op f3n5r4D8P+ pMW5FonS+B FQY4yA1HUq QH7tBygKES DR+8Vd/6Nv vvgwIH554S qTi3P/7zf9 Z8Gl4iWDm/ A5ziUohM4S 8jMX98TPEq ABAUgCKpAH ykAd6ABDYA asgC1wBG7A G/iDEBAJVg MWSASpgA+y QB7YBApBMd gJ9oBqUAca QTNoBcdBJz gFzoNL4Bq4 AW6D+2AUTI BnYBa8BgsQ BGEhMkSB5C EVSBPSh8wg BmQPuUG+UB AUCcVCCRAP EkJ50GaoGC qDqqF6qBn6 HjoJnYeuQI PQXWgMmoZ+ h97BCEyCqb ASrAUbwwzY CfaBQ+BVcA K8Bs6FC+Ad cCXcAB+FO+ Dz8DX4NjwK P4PnEIAQER qiihgiDMQF 8UeikHiEj6 xHipAKpAFp RbqRPuQmMo rMIG9RGBQF RUcZomxRnq hQFAu1BrUe VYKqRh1Gda B6UTdRY6hZ 1Ec0Ga2I1k fboL3QEegE dBa6EF2Bbk K3oy+ib6Mn 0K8xGAwNo4 2xwnhiIjFJ mLWYEsw+TB vmHGYQM46Z w2Kx8lh9rB 3WH8vECrCF 2CrsUexZ7B B2AvsGR8Sp 4Mxw7rgoHA +Xj6vAHcGd wQ3hJnELeC m8Jt4G749n 43PwpfhGfD f+On4Cv0CQ JmgT7AghhC TCJkIloZVw kfCA8JJIJK oRrYmBRC5x I7GSeIx4mT hGfEuSIemR XEjRJCFpB+ kQ6RzpLukl mUzWIjuSo8 gC8g5yM/kC +RH5jQRFwk jCS4ItsUGi RqJDYkjiuS ReUlPSSXK1 ZK5kheQJye uSM1J4KS0p Fymm1HqpGq mTUiNSc9IU aVNpf+lU6R LpI9JXpKdk sDJaMm4ybJ kCmYMyF2TG KQhFneJCYV E2UxopFykT VAxVm+pFTa IWU7+jDlBn ZWVkl8mGyW bL1sielh2l ITQtmhcthV ZKO04bpr1b orTEaQlnyf YlrUuGlszL LZVzlOPIFc m1yd2WeydP l3eTT5bfJd 8p/1ABpaCn EKiQpbBf4a LCzFLqUtul rKVFS48vva cIK+opBimu VTyo2K84p6 Ss5KGUrlSl dEFpRpmm7K icpFyufEZ5 WoWiYq/CVS lXOavylC5L d6Kn0Cvpvf RZVUVVT1Wh ar3qgOqCmr ZaqFq+Wpva Q3WCOkM9Xr 1cvUd9VkNF w08jT6NF45 4mXpOhmai5 V7NPc15LWy tca6tWp9aU tpy2l3audo v2Ax2yjoPO Gp0GnVu6GF 2GbrLuPt0b erCehV6iXo 3edX1Y31Kf q79Pf9AAbW BtwDNoMBgx JBk6GWYath iOGdGMfI3y jTqNnhtrGE cZ7zLuM/5o YmGSYtJoct 9UxtTbNN+0 2/R3Mz0zll mN2S1zsrm7 +QbzLvMXy/ SXcZbtX3bH gmLhZ7HVos fig6WVJd+y 1XLaSsMq1q rWaoRBZQQw ShiXrdHWzt YbrE9Zv7Wx tBHYHLf5zd bQNtn2iO3U cu3lnOWNy8 ft1OyYdvV2 o/Z0+1j7A/ ajDqoOTIcG h8eO6o5sxy bHSSddpySn o07PnU2c+c 7tzvMuNi7r XM65Iq4erk WuA24ybqFu 1W6P3NXcE9 xb3Gc9LDzW epzzRHv6eO 7yHPFS8mJ5 NXvNelt5r/ Pu9SH5BPtU +zz21fPl+3 b7wX7efrv9 HqzQXMFb0e kP/L38d/s/ DNAOWBPwYy AmMCCwJvBJ kGlQXlBfMC U4JvhI8OsQ 55DSkPuhOq HC0J4wybDo sOaw+XDX8L Lw0QjjiHUR 1yIVIrmRXV HYqLCopqi5 lW4r96yciL aILoweXqW9 KnvVldUKq1 NWn46RjGHG nIhFx4bHHo l9z/RnNjDn 4rziauNmWS 6svaxnbEd2 OXuaY8cp40 zG28WXxU8l 2CXsTphOdE isSJzhunCr uS+SPJPqku aT/ZMPJX9K CU9pS8Wlxq ae5Mnwknm9 acpp2WmD6f rphemja2zW 7Fkzy/fhN2 VAGasyugRU 0c9Uv1BHuE U4lmmfWZP5 Jiss60S2dD Yvuz9HL2d7 zmSue+63a1 FrWWt78lTz NuWNrXNaV7 8eWh+3vmeD +oaCDRMbPT Ye3kTYlLzp p3yT/LL8V5 vDN3cXKBVs LBjf4rGlpV CikF84stV2 a9021Dbuto Ht5turtn8s YhddLTYpri h+X8IqufqN 6TeV33zaEb 9joNSydP9O zE7ezuFdDr sOl0mX5ZaN 7/bb3VFOLy 8qf7UnZs+V imUVdXsJe4 V7Ryt9K7uq NKp2Vr2vTq y+XeNc01ar WLu9dn4fe9 /Qfsf9rXVK dcV17w5wD9 yp96jvaNBq qDiIOZh58E ljWGPft4xv m5sUmoqbPh ziHRo9HHS4 t9mqufmI4p HSFrhF2DJ9 NProje9cv+ tqNWytb6O1 FR8Dx4THnn 4f+/3wcZ/j PScYJ1p/0P yhtp3SXtQB deR0zHYmdo 52RXYNnvQ+ 2dNt293+o9 GPh06pnqo5 LXu69AzhTM GZT2dzz86d Sz83cz7h/H hPTM/9CxEX bvUG9g5c9L l4+ZL7pQt9 Tn1nL9tdPn XF5srJq4yr ndcsr3X0W/ S3/2TxU/uA 5UDHdavrXT esb3QPLh88 M+QwdP6m68 1Lt7xuXbu9 4vbgcOjwnZ HokdE77DtT d1PuvriXeW /h/sYH6AdF D6UeVjxSfN Tws+7PbaOW o6fHXMf6Hw c/vj/OGn/2 S8Yv7ycKnp CfVEyqTDZP mU2dmnafvv F05dOJZ+nP FmYKf5X+tf a5zvMffnP8 rX82YnbiBf /Fp99LXsq/ PPRq2aueuY C5R69TXy/M F72Rf3P4Le Nt37vwd5ML We+x7ys/6H 7o/ujz8cGn 1E+f/gUDmP P8usTo0wAA AAlwSFlzAA AOxAAADsQB lSsOGwAAAQ NJREFUOE9j +P//PwZmNP XWB+L7QPwf iveDxLCpxR AAKuRnMvP5 gKQZjJnNfS 6iqwVhDAFe +2AndM1IGM MVKBwQ1o3I 8sGiEYyL+m dLo6tH4YAw l03gUmyaQZ jN0r8QXT0K B4SFnSP2YN MMwsoByQ3o 6lE4ILzvzE VrVgu/z+ia BRzD7izbcU AbXT0KB4pZ lPyTtqMb4J ZT0wSSQ1OL 1QCG8MqOeH QDgEAKWQ0M YwgAFfMDo3 IaugFAHI+u FoThDKACUO qbD8TvoRqw YVDqrAdieb gBQA5IIyip YtOAD4Ms42 cAJVE0CaIx i7nvQpALsE oSg/kdQk9R ZICgU9gZCg 0IOwMAqzT/ oq6scnwAAA AASUVORK5C YII=</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Hum an User</a :Name><a:P arentId>GE .EI</a:Par entId><a:R epresentat ion>Rectan gle</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes/><a: AvailableT oBaseModel s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Exte rnalStorag e.OM"/><a: Behavior i :nil="true "/><a:Desc ription> | |
54 | A la rge servic e that has only one instance o n the Inte rnet, for example, O utlook.com and Xbox Live. | |
55 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.Megas evrice</a: Id><a:Imag eLocation> Lower righ t of stenc il</a:Imag eLocation> <a:ImageSo urce>iVBOR w0KGgoAAAA NSUhEUgAAA BAAAAAQCAY AAAAf8/9hA AAABGdBTUE AALGOfPtRk wAAACBjSFJ NAACHDwAAj A8AAP1SAAC BQAAAfXkAA OmLAAA85QA AGcxzPIV3A AAKOWlDQ1B QaG90b3Nob 3AgSUNDIHB yb2ZpbGUAA EjHnZZ3VFT XFofPvXd6o c0wAlKG3rv AANJ7k15FY ZgZYCgDDjM 0sSGiAhFFR JoiSFDEgNF QJFZEsRAUV LAHJAgoMRh FVCxvRtaLr qy89/Ly++O sb+2z97n77 L3PWhcAkqc vl5cGSwGQy hPwgzyc6RG RUXTsAIABH mCAKQBMVka 6X7B7CBDJy 82FniFyAl8 EAfB6WLwCc NPQM4BOB/+ fpFnpfIHom AARm7M5GSw RF4g4JUuQL rbPipgalyx mGCVmvihBE cuJOWGRDT7 7LLKjmNmpP LaIxTmns1P ZYu4V8bZMI UfEiK+ICzO 5nCwR3xKxR oowlSviN+L YVA4zAwAUS WwXcFiJIjY RMYkfEuQi4 uUA4EgJX3H cVyzgZAvEl 3JJS8/hcxM SBXQdli7d1 NqaQffkZKV wBALDACYrm cln013SUtO ZvBwAFu/8W TLi2tJFRbY 0tba0NDQzM v2qUP91829 K3NtFehn4u WcQrf+L7a/ 80hoAYMyJa rPziy2uCoD OLQDI3fti0 zgAgKSobx3 Xv7oPTTwvi QJBuo2xcVZ WlhGXwzISF /QP/U+Hv6G vvmckPu6P8 tBdOfFMYYq ALq4bKy0lT cinZ6QzWRy 64Z+H+B8H/ nUeBkGceA6 fwxNFhImmj MtLELWbx+Y KuGk8Opf3n 5r4D8P+pMW 5FonS+BFQY 4yA1HUqQH7 tBygKESDR+ 8Vd/6Nvvvg wIH554SqTi 3P/7zf9Z8G l4iWDm/A5z iUohM4S8jM X98TPEqABA UgCKpAHykA d6ABDYAasg C1wBG7AG/i DEBAJVgMWS ASpgA+yQB7 YBApBMdgJ9 oBqUAcaQTN oBcdBJzgFz oNL4Bq4AW6 D+2AUTIBnY Ba8BgsQBGE hMkSB5CEVS BPSh8wgBmQ PuUG+UBAUC cVCCRAPEkJ 50GaoGCqDq qF6qBn6Hjo JnYeuQIPQX WgMmoZ+h97 BCEyCqbASr AUbwwzYCfa BQ+BVcAK8B s6FC+AdcCX cAB+FO+Dz8 DX4NjwKP4P nEIAQERqii hgiDMQF8Ue ikHiEj6xHi pAKpAFpRbq RPuQmMorMI G9RGBQFRUc ZomxRnqhQF Au1BrUeVYK qRh1GdaB6U TdRY6hZ1Ec 0Ga2I1kfbo L3QEegEdBa 6EF2BbkK3o y+ib6Mn0K8 xGAwNo42xw nhiIjFJmLW YEsw+TBvmH GYQM46Zw2K x8lh9rB3WH 8vECrCF2Cr sUexZ7BB2A vsGR8Sp4Mx w7rgoHA+Xj 6vAHcGdwQ3 hJnELeCm8J t4G749n43P wpfhGfDf+O n4Cv0CQJmg T7AghhCTCJ kIloZVwkfC A8JJIJKoRr YmBRC5xI7G SeIx4mThGf EuSIemRXEj RJCFpB+kQ6 RzpLuklmUz WIjuSo8gC8 g5yM/kC+RH 5jQRFwkjCS 4ItsUGiRqJ DYkjiuSReU lPSSXK1ZK5 kheQJyeuSM 1J4KS0pFym m1HqpGqmTU iNSc9IUaVN pf+lU6RLpI 9JXpKdksDJ aMm4ybJkCm YMyF2TGKQh FneJCYVE2U xopFykTVAx Vm+pFTaIWU 7+jDlBnZWV kl8mGyWbL1 sielh2lITQ tmhcthVZKO 04bpr1borT EaQlnyfYlr UuGlszLLZV zlOPIFcm1y d2WeydPl3e TT5bfJd8p/ 1ABpaCnEKi QpbBf4aLCz FLqUtulrKV FS48vvacIK +opBimuVTy o2K84p6Ss5 KGUrlSldEF pRpmm7Kicp FyufEZ5WoW iYq/CVSlXO avylC5Ld6K n0CvpvfRZV UVVT1Whar3 qgOqCmrZaq Fq+WpvaQ3W COkM9Xr1cv Ud9VkNFw08 jT6NF454mX pOhmai5V7N Pc15LWytca 6tWp9aUtpy 2l3audov2A x2yjoPOGp0 GnVu6GF2Gb rLuPt0berC ehV6iXo3ed X1Y31Kfq79 Pf9AAbWBtw DNoMBgxJBk 6GWYathiOG dGMfI3yjTq NnhtrGEcZ7 zLuM/5oYmG SYtJoct9Ux tTbNN+02/R 3Mz0zllmN2 S1zsrm7+Qb zLvMXy/SXc ZbtX3bHgmL hZ7HVosfig 6WVJd+y1XL aSsMq1qrWa oRBZQQwShi XrdHWztYbr E9Zv7WxtBH YHLf5zdbQN tn2iO3Ucu3 lnOWNy8ft1 OyYdvV2o/Z 0+1j7A/ajD qoOTIcGh8e O6o5sxybHS SddpySno07 PnU2c+c7tz vMuNi7rXM6 5Iq4erkWuA 24ybqFu1W6 P3NXcE9xb3 Gc9LDzWepz zRHv6eO7yH PFS8mJ5NXv Nelt5r/Pu9 SH5BPtU+zz 21fPl+3b7w X7efrv9Hqz QXMFb0ekP/ L38d/s/DNA OWBPwYyAmM CCwJvBJkGl QXlBfMCU4J vhI8OsQ55D SkPuhOqHC0 J4wybDosOa w+XDX8LLw0 QjjiHUR1yI VIrmRXVHYq LCopqi5lW4 r96yciLaIL oweXqW9Knv VldUKq1NWn 46RjGHGnIh Fx4bHHol9z /RnNjDn4rz iauNmWS6sv axnbEd2OXu aY8cp40zG2 8WXxU8l2CX sTphOdEisS JzhunCruS+ SPJPqkuaT/ ZMPJX9KCU9 pS8Wlxqae5 Mnwknm9acp p2WmD6frph emja2zW7Fk zy/fhN2VAG asyugRU0c9 Uv1BHuEU4l mmfWZP5Jis s60S2dDYvu z9HL2d7zmS ue+63a1FrW Wt78lTzNuW NrXNaV78eW h+3vmeD+oa CDRMbPTYe3 kTYlLzpp3y T/LL8V5vDN 3cXKBVsLBj f4rGlpVCik F84stV2a90 21DbutoHt5 turtn8sYhd dLTYprih+X 8IqufqN6Te V33zaEb9jo NSydP9OzE7 ezuFdDrsOl 0mX5ZaN7/b b3VFOLy8qf 7UnZs+VimU VdXsJe4V7R yt9K7uqNKp 2Vr2vTqy+X eNc01arWLu 9dn4fe9/Qf sf9rXVKdcV 17w5wD9yp9 6jvaNBqqDi IOZh58EljW GPft4xvm5s UmoqbPhziH Ro9HHS4t9m qufmI4pHSF rhF2DJ9NPr oje9cv+tqN Wytb6O1FR8 Dx4THnn4f+ /3wcZ/jPSc YJ1p/0Pyht p3SXtQBdeR 0zHYmdo52R XYNnvQ+2dN t293+o9GPh 06pnqo5LXu 69AzhTMGZT 2dzz86dSz8 3cz7h/HhPT M/9CxEXbvU G9g5c9Ll4+ ZL7pQt9Tn1 nL9tdPnXF5 srJq4yrndc sr3X0W/S3/ 2TxU/uA5UD HdavrXTesb 3QPLh88M+Q wdP6m681Lt 7xuXbu94vb gcOjwnZHok dE77DtTd1P uvriXeW/h/ sYH6AdFD6U eVjxSfNTws +7PbaOWo6f HXMf6Hwc/v j/OGn/2S8Y v7ycKnpCfV EyqTDZPmU2 dmnafvvF05 dOJZ+nPFmY Kf5X+tfa5z vMffnP8rX8 2YnbiBf/Fp 99LXsq/PPR q2aueuYC5R 69TXy/MF72 Rf3P4LeNt3 7vwd5MLWe+ x7ys/6H7o/ ujz8cGn1E+ f/gUDmPP8u sTo0wAAAAl wSFlzAAAOx AAADsQBlSs OGwAAALBJR EFUOE+l0rE JwmAQBeBfB EFwAAcQBHs LwQ1srRwgr Uu4gZO4gQN YWQmpbG0d4 HwvmHD+eZo cFh8JL3eP5 CfJzP4iw4g 0WG66LKCAl csarcCZwhn MucEMmjm/U JvDEPLl2hX 4vJr3ixO4A Iee7+s3a2g VbEENK3v4K NgBX00NKzw L7lQFPGE11 EfBgnsWRpQ s6DqwXx4sO GVhxJEFY95 A5FNKOMBI/ t8RMoyQYX+ WXnB1v3lL8 LpjAAAAAEl FTkSuQmCC< /a:ImageSo urce><a:Im ageStream i:nil="tru e"/><a:Nam e>Megaserv ice</a:Nam e><a:Paren tId>GE.EI< /a:ParentI d><a:Repre sentation> Rectangle< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Not A pplicable< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Authen ticates It self</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Stat ic</a:Mode ><a:Name>a uthenticat esItself</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Code< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Type</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>type</a :Name><a:T ype>List</ a:Type></a :Attribute ></a:Attri butes><a:A vailableTo BaseModels xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Exter nalStorage .OM"/><a:B ehavior i: nil="true" /><a:Descr iption> | |
56 | Repr esents the point whe re an appl ication ca lls into a n unmanged runtime l ibrary suc h as the C RT. | |
57 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.CRT</ a:Id><a:Im ageLocatio n>Lower ri ght of ste ncil</a:Im ageLocatio n><a:Image Source>iVB ORw0KGgoAA AANSUhEUgA AABIAAAASC AYAAABWzo5 XAAAABGdBT UEAALGOfPt RkwAAACBjS FJNAACHDwA AjA8AAP1SA ACBQAAAfXk AAOmLAAA85 QAAGcxzPIV 3AAAKOWlDQ 1BQaG90b3N ob3AgSUNDI HByb2ZpbGU AAEjHnZZ3V FTXFofPvXd 6oc0wAlKG3 rvAANJ7k15 FYZgZYCgDD jM0sSGiAhF FRJoiSFDEg NFQJFZEsRA UVLAHJAgoM RhFVCxvRta Lrqy89/Ly+ +Osb+2z97n 77L3PWhcAk qcvl5cGSwG QyhPwgzyc6 RGRUXTsAIA BHmCAKQBMV ka6X7B7CBD Jy82FniFyA l8EAfB6WLw CcNPQM4BOB /+fpFnpfIH omAARm7M5G SwRF4g4JUu QLrbPipgal yxmGCVmvih BEcuJOWGRD T77LLKjmNm pPLaIxTmns 1PZYu4V8bZ MIUfEiK+IC zO5nCwR3xK xRoowlSviN +LYVA4zAwA USWwXcFiJI jYRMYkfEuQ i4uUA4EgJX 3HcVyzgZAv El3JJS8/hc xMSBXQdli7 d1NqaQffkZ KVwBALDACY rmcln013SU tOZvBwAFu/ 8WTLi2tJFR bY0tba0NDQ zMv2qUP918 29K3NtFehn 4uWcQrf+L7 a/80hoAYMy JarPziy2uC oDOLQDI3ft i0zgAgKSob x3Xv7oPTTw viQJBuo2xc VZWlhGXwzI SF/QP/U+Hv 6GvvmckPu6 P8tBdOfFMY YqALq4bKy0 lTcinZ6QzW Ry64Z+H+B8 H/nUeBkGce A6fwxNFhIm mjMtLELWbx +YKuGk8Opf 3n5r4D8P+p MW5FonS+BF QY4yA1HUqQ H7tBygKESD R+8Vd/6Nvv vgwIH554Sq Ti3P/7zf9Z 8Gl4iWDm/A 5ziUohM4S8 jMX98TPEqA BAUgCKpAHy kAd6ABDYAa sgC1wBG7AG /iDEBAJVgM WSASpgA+yQ B7YBApBMdg J9oBqUAcaQ TNoBcdBJzg FzoNL4Bq4A W6D+2AUTIB nYBa8BgsQB GEhMkSB5CE VSBPSh8wgB mQPuUG+UBA UCcVCCRAPE kJ50GaoGCq DqqF6qBn6H joJnYeuQIP QXWgMmoZ+h 97BCEyCqbA SrAUbwwzYC faBQ+BVcAK 8Bs6FC+Adc CXcAB+FO+D z8DX4NjwKP 4PnEIAQERq iihgiDMQF8 UeikHiEj6x HipAKpAFpR bqRPuQmMor MIG9RGBQFR UcZomxRnqh QFAu1BrUeV YKqRh1GdaB 6UTdRY6hZ1 Ec0Ga2I1kf boL3QEegEd Ba6EF2BbkK 3oy+ib6Mn0 K8xGAwNo42 xwnhiIjFJm LWYEsw+TBv mHGYQM46Zw 2Kx8lh9rB3 WH8vECrCF2 CrsUexZ7BB 2AvsGR8Sp4 Mxw7rgoHA+ Xj6vAHcGdw Q3hJnELeCm 8Jt4G749n4 3PwpfhGfDf +On4Cv0CQJ mgT7AghhCT CJkIloZVwk fCA8JJIJKo RrYmBRC5xI 7GSeIx4mTh GfEuSIemRX EjRJCFpB+k Q6RzpLuklm UzWIjuSo8g C8g5yM/kC+ RH5jQRFwkj CS4ItsUGiR qJDYkjiuSR eUlPSSXK1Z K5kheQJyeu SM1J4KS0pF ymm1HqpGqm TUiNSc9IUa VNpf+lU6RL pI9JXpKdks DJaMm4ybJk CmYMyF2TGK QhFneJCYVE 2UxopFykTV AxVm+pFTaI WU7+jDlBnZ WVkl8mGyWb L1sielh2lI TQtmhcthVZ KO04bpr1bo rTEaQlnyfY lrUuGlszLL ZVzlOPIFcm 1yd2WeydPl 3eTT5bfJd8 p/1ABpaCnE KiQpbBf4aL CzFLqUtulr KVFS48vvac IK+opBimuV Tyo2K84p6S s5KGUrlSld EFpRpmm7Ki cpFyufEZ5W oWiYq/CVSl XOavylC5Ld 6Kn0CvpvfR ZVUVVT1Wha r3qgOqCmrZ aqFq+WpvaQ 3WCOkM9Xr1 cvUd9VkNFw 08jT6NF454 mXpOhmai5V 7NPc15LWyt ca6tWp9aUt py2l3audov 2Ax2yjoPOG p0GnVu6GF2 GbrLuPt0be rCehV6iXo3 edX1Y31Kfq 79Pf9AAbWB twDNoMBgxJ Bk6GWYathi OGdGMfI3yj TqNnhtrGEc Z7zLuM/5oY mGSYtJoct9 UxtTbNN+02 /R3Mz0zllm N2S1zsrm7+ QbzLvMXy/S XcZbtX3bHg mLhZ7HVosf ig6WVJd+y1 XLaSsMq1qr WaoRBZQQwS hiXrdHWztY brE9Zv7Wxt BHYHLf5zdb QNtn2iO3Uc u3lnOWNy8f t1OyYdvV2o /Z0+1j7A/a jDqoOTIcGh 8eO6o5sxyb HSSddpySno 07PnU2c+c7 tzvMuNi7rX M65Iq4erkW uA24ybqFu1 W6P3NXcE9x b3Gc9LDzWe pzzRHv6eO7 yHPFS8mJ5N XvNelt5r/P u9SH5BPtU+ zz21fPl+3b 7wX7efrv9H qzQXMFb0ek P/L38d/s/D NAOWBPwYyA mMCCwJvBJk GlQXlBfMCU 4JvhI8OsQ5 5DSkPuhOqH C0J4wybDos Oaw+XDX8LL w0QjjiHUR1 yIVIrmRXVH YqLCopqi5l W4r96yciLa ILoweXqW9K nvVldUKq1N Wn46RjGHGn IhFx4bHHol 9z/RnNjDn4 rziauNmWS6 svaxnbEd2O XuaY8cp40z G28WXxU8l2 CXsTphOdEi sSJzhunCru S+SPJPqkua T/ZMPJX9KC U9pS8Wlxqa e5Mnwknm9a cpp2WmD6fr phemja2zW7 Fkzy/fhN2V AGasyugRU0 c9Uv1BHuEU 4lmmfWZP5J iss60S2dDY vuz9HL2d7z mSue+63a1F rWWt78lTzN uWNrXNaV78 eWh+3vmeD+ oaCDRMbPTY e3kTYlLzpp 3yT/LL8V5v DN3cXKBVsL Bjf4rGlpVC ikF84stV2a 9021DbutoH t5turtn8sY hddLTYprih +X8IqufqN6 TeV33zaEb9 joNSydP9Oz E7ezuFdDrs Ol0mX5ZaN7 /bb3VFOLy8 qf7UnZs+Vi mUVdXsJe4V 7Ryt9K7uqN Kp2Vr2vTqy +XeNc01arW Lu9dn4fe9/ Qfsf9rXVKd cV17w5wD9y p96jvaNBqq DiIOZh58El jWGPft4xvm 5sUmoqbPhz iHRo9HHS4t 9mqufmI4pH SFrhF2DJ9N Proje9cv+t qNWytb6O1F R8Dx4THnn4 f+/3wcZ/jP ScYJ1p/0Py htp3SXtQBd eR0zHYmdo5 2RXYNnvQ+2 dNt293+o9G Ph06pnqo5L Xu69AzhTMG ZT2dzz86dS z83cz7h/Hh PTM/9CxEXb vUG9g5c9Ll 4+ZL7pQt9T n1nL9tdPnX F5srJq4yrn dcsr3X0W/S 3/2TxU/uA5 UDHdavrXTe sb3QPLh88M +QwdP6m681 Lt7xuXbu94 vbgcOjwnZH okdE77DtTd 1PuvriXeW/ h/sYH6AdFD 6UeVjxSfNT ws+7PbaOWo 6fHXMf6Hwc /vj/OGn/2S 8Yv7ycKnpC fVEyqTDZPm U2dmnafvvF 05dOJZ+nPF mYKf5X+tfa 5zvMffnP8r X82YnbiBf/ Fp99LXsq/P PRq2aueuYC 5R69TXy/MF 72Rf3P4LeN t37vwd5MLW e+x7ys/6H7 o/ujz8cGn1 E+f/gUDmPP 8usTo0wAAA AlwSFlzAAA LEwAACxMBA JqcGAAAANB JREFUOE9j+ P//P1UwVkF yMJhgNPX+j wW/B2J5dA2 4MJhAMwCOm c19LgJpfnR N2DCYQDeAD GxPFYN0I7J 8aG+QgGPYH dWglJ0wvkV i0SJWC7/Py GpgGK9B6W2 TM4Fy2iDDA kqau4BsJb+ ixg5savEax GTm8wFI64M MA2IpEBsYi x+R1cAwwTA SdY1MB8mDM Ldt0FRsakA Yr0FQ74BdA sJAtjpymCF jQoG9Ekjrg 7wI86aEe/R 6ZDUwTNBrx GLqGwTErhR iQZhBFGOsg qTj/wwAWDi jBcYFCvcAA AAASUVORK5 CYII=</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>Wi ndows Runt ime</a:Nam e><a:Paren tId>GE.EI< /a:ParentI d><a:Repre sentation> Rectangle< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Not A pplicable< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Authen ticates It self</a:Di splayName> <a:Inherit ance>Virtu al</a:Inhe ritance><a :Mode>Stat ic</a:Mode ><a:Name>a uthenticat esItself</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Code< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Type</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>type</a :Name><a:T ype>List</ a:Type></a :Attribute ></a:Attri butes><a:A vailableTo BaseModels xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Exter nalStorage .OM"/><a:B ehavior i: nil="true" /><a:Descr iption> | |
58 | Repr esents the point whe re an appl ication ca lls into t he .NET Fr amework. | |
59 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.NFX</ a:Id><a:Im ageLocatio n>Lower ri ght of ste ncil</a:Im ageLocatio n><a:Image Source>iVB ORw0KGgoAA AANSUhEUgA AABIAAAASC AYAAABWzo5 XAAAABGdBT UEAALGOfPt RkwAAACBjS FJNAACHDwA AjA8AAP1SA ACBQAAAfXk AAOmLAAA85 QAAGcxzPIV 3AAAKOWlDQ 1BQaG90b3N ob3AgSUNDI HByb2ZpbGU AAEjHnZZ3V FTXFofPvXd 6oc0wAlKG3 rvAANJ7k15 FYZgZYCgDD jM0sSGiAhF FRJoiSFDEg NFQJFZEsRA UVLAHJAgoM RhFVCxvRta Lrqy89/Ly+ +Osb+2z97n 77L3PWhcAk qcvl5cGSwG QyhPwgzyc6 RGRUXTsAIA BHmCAKQBMV ka6X7B7CBD Jy82FniFyA l8EAfB6WLw CcNPQM4BOB /+fpFnpfIH omAARm7M5G SwRF4g4JUu QLrbPipgal yxmGCVmvih BEcuJOWGRD T77LLKjmNm pPLaIxTmns 1PZYu4V8bZ MIUfEiK+IC zO5nCwR3xK xRoowlSviN +LYVA4zAwA USWwXcFiJI jYRMYkfEuQ i4uUA4EgJX 3HcVyzgZAv El3JJS8/hc xMSBXQdli7 d1NqaQffkZ KVwBALDACY rmcln013SU tOZvBwAFu/ 8WTLi2tJFR bY0tba0NDQ zMv2qUP918 29K3NtFehn 4uWcQrf+L7 a/80hoAYMy JarPziy2uC oDOLQDI3ft i0zgAgKSob x3Xv7oPTTw viQJBuo2xc VZWlhGXwzI SF/QP/U+Hv 6GvvmckPu6 P8tBdOfFMY YqALq4bKy0 lTcinZ6QzW Ry64Z+H+B8 H/nUeBkGce A6fwxNFhIm mjMtLELWbx +YKuGk8Opf 3n5r4D8P+p MW5FonS+BF QY4yA1HUqQ H7tBygKESD R+8Vd/6Nvv vgwIH554Sq Ti3P/7zf9Z 8Gl4iWDm/A 5ziUohM4S8 jMX98TPEqA BAUgCKpAHy kAd6ABDYAa sgC1wBG7AG /iDEBAJVgM WSASpgA+yQ B7YBApBMdg J9oBqUAcaQ TNoBcdBJzg FzoNL4Bq4A W6D+2AUTIB nYBa8BgsQB GEhMkSB5CE VSBPSh8wgB mQPuUG+UBA UCcVCCRAPE kJ50GaoGCq DqqF6qBn6H joJnYeuQIP QXWgMmoZ+h 97BCEyCqbA SrAUbwwzYC faBQ+BVcAK 8Bs6FC+Adc CXcAB+FO+D z8DX4NjwKP 4PnEIAQERq iihgiDMQF8 UeikHiEj6x HipAKpAFpR bqRPuQmMor MIG9RGBQFR UcZomxRnqh QFAu1BrUeV YKqRh1GdaB 6UTdRY6hZ1 Ec0Ga2I1kf boL3QEegEd Ba6EF2BbkK 3oy+ib6Mn0 K8xGAwNo42 xwnhiIjFJm LWYEsw+TBv mHGYQM46Zw 2Kx8lh9rB3 WH8vECrCF2 CrsUexZ7BB 2AvsGR8Sp4 Mxw7rgoHA+ Xj6vAHcGdw Q3hJnELeCm 8Jt4G749n4 3PwpfhGfDf +On4Cv0CQJ mgT7AghhCT CJkIloZVwk fCA8JJIJKo RrYmBRC5xI 7GSeIx4mTh GfEuSIemRX EjRJCFpB+k Q6RzpLuklm UzWIjuSo8g C8g5yM/kC+ RH5jQRFwkj CS4ItsUGiR qJDYkjiuSR eUlPSSXK1Z K5kheQJyeu SM1J4KS0pF ymm1HqpGqm TUiNSc9IUa VNpf+lU6RL pI9JXpKdks DJaMm4ybJk CmYMyF2TGK QhFneJCYVE 2UxopFykTV AxVm+pFTaI WU7+jDlBnZ WVkl8mGyWb L1sielh2lI TQtmhcthVZ KO04bpr1bo rTEaQlnyfY lrUuGlszLL ZVzlOPIFcm 1yd2WeydPl 3eTT5bfJd8 p/1ABpaCnE KiQpbBf4aL CzFLqUtulr KVFS48vvac IK+opBimuV Tyo2K84p6S s5KGUrlSld EFpRpmm7Ki cpFyufEZ5W oWiYq/CVSl XOavylC5Ld 6Kn0CvpvfR ZVUVVT1Wha r3qgOqCmrZ aqFq+WpvaQ 3WCOkM9Xr1 cvUd9VkNFw 08jT6NF454 mXpOhmai5V 7NPc15LWyt ca6tWp9aUt py2l3audov 2Ax2yjoPOG p0GnVu6GF2 GbrLuPt0be rCehV6iXo3 edX1Y31Kfq 79Pf9AAbWB twDNoMBgxJ Bk6GWYathi OGdGMfI3yj TqNnhtrGEc Z7zLuM/5oY mGSYtJoct9 UxtTbNN+02 /R3Mz0zllm N2S1zsrm7+ QbzLvMXy/S XcZbtX3bHg mLhZ7HVosf ig6WVJd+y1 XLaSsMq1qr WaoRBZQQwS hiXrdHWztY brE9Zv7Wxt BHYHLf5zdb QNtn2iO3Uc u3lnOWNy8f t1OyYdvV2o /Z0+1j7A/a jDqoOTIcGh 8eO6o5sxyb HSSddpySno 07PnU2c+c7 tzvMuNi7rX M65Iq4erkW uA24ybqFu1 W6P3NXcE9x b3Gc9LDzWe pzzRHv6eO7 yHPFS8mJ5N XvNelt5r/P u9SH5BPtU+ zz21fPl+3b 7wX7efrv9H qzQXMFb0ek P/L38d/s/D NAOWBPwYyA mMCCwJvBJk GlQXlBfMCU 4JvhI8OsQ5 5DSkPuhOqH C0J4wybDos Oaw+XDX8LL w0QjjiHUR1 yIVIrmRXVH YqLCopqi5l W4r96yciLa ILoweXqW9K nvVldUKq1N Wn46RjGHGn IhFx4bHHol 9z/RnNjDn4 rziauNmWS6 svaxnbEd2O XuaY8cp40z G28WXxU8l2 CXsTphOdEi sSJzhunCru S+SPJPqkua T/ZMPJX9KC U9pS8Wlxqa e5Mnwknm9a cpp2WmD6fr phemja2zW7 Fkzy/fhN2V AGasyugRU0 c9Uv1BHuEU 4lmmfWZP5J iss60S2dDY vuz9HL2d7z mSue+63a1F rWWt78lTzN uWNrXNaV78 eWh+3vmeD+ oaCDRMbPTY e3kTYlLzpp 3yT/LL8V5v DN3cXKBVsL Bjf4rGlpVC ikF84stV2a 9021DbutoH t5turtn8sY hddLTYprih +X8IqufqN6 TeV33zaEb9 joNSydP9Oz E7ezuFdDrs Ol0mX5ZaN7 /bb3VFOLy8 qf7UnZs+Vi mUVdXsJe4V 7Ryt9K7uqN Kp2Vr2vTqy +XeNc01arW Lu9dn4fe9/ Qfsf9rXVKd cV17w5wD9y p96jvaNBqq DiIOZh58El jWGPft4xvm 5sUmoqbPhz iHRo9HHS4t 9mqufmI4pH SFrhF2DJ9N Proje9cv+t qNWytb6O1F R8Dx4THnn4 f+/3wcZ/jP ScYJ1p/0Py htp3SXtQBd eR0zHYmdo5 2RXYNnvQ+2 dNt293+o9G Ph06pnqo5L Xu69AzhTMG ZT2dzz86dS z83cz7h/Hh PTM/9CxEXb vUG9g5c9Ll 4+ZL7pQt9T n1nL9tdPnX F5srJq4yrn dcsr3X0W/S 3/2TxU/uA5 UDHdavrXTe sb3QPLh88M +QwdP6m681 Lt7xuXbu94 vbgcOjwnZH okdE77DtTd 1PuvriXeW/ h/sYH6AdFD 6UeVjxSfNT ws+7PbaOWo 6fHXMf6Hwc /vj/OGn/2S 8Yv7ycKnpC fVEyqTDZPm U2dmnafvvF 05dOJZ+nPF mYKf5X+tfa 5zvMffnP8r X82YnbiBf/ Fp99LXsq/P PRq2aueuYC 5R69TXy/MF 72Rf3P4LeN t37vwd5MLW e+x7ys/6H7 o/ujz8cGn1 E+f/gUDmPP 8usTo0wAAA AlwSFlzAAA LEwAACxMBA JqcGAAAANB JREFUOE9j+ P//P1UwVkF yMJhgNPX+j wW/B2J5dA2 4MJhAMwCOm c19LgJpfnR N2DCYQDeAD GxPFYN0I7J 8aG+QgGPYH dWglJ0wvkV i0SJWC7/Py GpgGK9B6W2 TM4Fy2iDDA kqau4BsJb+ ixg5savEax GTm8wFI64M MA2IpEBsYi x+R1cAwwTA SdY1MB8mDM Ldt0FRsakA Yr0FQ74BdA sJAtjpymCF jQoG9Ekjrg 7wI86aEe/R 6ZDUwTNBrx GLqGwTErhR iQZhBFGOsg qTj/wwAWDi jBcYFCvcAA AAASUVORK5 CYII=</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>Wi ndows .NET Runtime</ a:Name><a: ParentId>G E.EI</a:Pa rentId><a: Representa tion>Recta ngle</a:Re presentati on><a:Shap e i:nil="t rue"/></a: ElementTyp e><a:Eleme ntType><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibutes><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Not Applic able</b:Va lue></a:At tributeVal ues><a:Dis playName>A uthenticat es Itself< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Static</a :Mode><a:N ame>authen ticatesIts elf</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Code</b:Va lue></a:At tributeVal ues><a:Dis playName>T ype</a:Dis playName>< a:Inherita nce>Virtua l</a:Inher itance><a: Mode>Stati c</a:Mode> <a:Name>ty pe</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute></a: Attributes ><a:Availa bleToBaseM odels xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. ExternalSt orage.OM"/ ><a:Behavi or i:nil=" true"/><a: Descriptio n> | |
60 | Repr esents the point whe re an appl ication ca lls into W inRT. | |
61 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.EI.TM Core.WinRT </a:Id><a: ImageLocat ion>Lower right of s tencil</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABIAAAA SCAYAAABWz o5XAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AALEwAACxM BAJqcGAAAA NBJREFUOE9 j+P//P1UwV kFyMJhgNPX +jwW/B2J5d A24MJhAMwC Omc19LgJpf nRN2DCYQDe ADGxPFYN0I 7J8aG+QgGP YHdWglJ0wv kVi0SJWC7/ PyGpgGK9B6 W2TM4Fy2iD DAkqau4BsJ b+ixg5savE axGTm8wFI6 4MMA2IpEBs Yix+R1cAww TASdY1MB8m DMLdt0FRsa kAYr0FQ74B dAsJAtjpym CFjQoG9Ekj rg7wI86aEe /R6ZDUwTNB rxGLqGwTEr hRiQZhBFGO sgqTj/wwAW DijBcYFCvc AAAAASUVOR K5CYII=</a :ImageSour ce><a:Imag eStream i: nil="true" /><a:Name> Windows RT Runtime</ a:Name><a: ParentId>G E.EI</a:Pa rentId><a: Representa tion>Recta ngle</a:Re presentati on><a:Shap e i:nil="t rue"/></a: ElementTyp e><a:Eleme ntType><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibutes/><a :Available ToBaseMode ls xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Ext ernalStora ge.OM"/><a :Behavior i:nil="tru e"/><a:Des cription> | |
62 | A represen tation of a Cloud St orage. | |
63 | </ a:Descript ion><a:Hid den>false< /a:Hidden> <a:Id>SE.D S.TMCore.C loudStorag e</a:Id><a :ImageLoca tion>Lower right of stencil</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGO fPtRkwAAAC BjSFJNAACH DwAAjA8AAP 1SAACBQAAA fXkAAOmLAA A85QAAGcxz PIV3AAAKOW lDQ1BQaG90 b3Nob3AgSU NDIHByb2Zp bGUAAEjHnZ Z3VFTXFofP vXd6oc0wAl KG3rvAANJ7 k15FYZgZYC gDDjM0sSGi AhFFRJoiSF DEgNFQJFZE sRAUVLAHJA goMRhFVCxv RtaLrqy89/ Ly++Osb+2z 97n77L3PWh cAkqcvl5cG SwGQyhPwgz yc6RGRUXTs AIABHmCAKQ BMVka6X7B7 CBDJy82Fni FyAl8EAfB6 WLwCcNPQM4 BOB/+fpFnp fIHomAARm7 M5GSwRF4g4 JUuQLrbPip galyxmGCVm vihBEcuJOW GRDT77LLKj mNmpPLaIxT mns1PZYu4V 8bZMIUfEiK +ICzO5nCwR 3xKxRoowlS viN+LYVA4z AwAUSWwXcF iJIjYRMYkf EuQi4uUA4E gJX3HcVyzg ZAvEl3JJS8 /hcxMSBXQd li7d1NqaQf fkZKVwBALD ACYrmcln01 3SUtOZvBwA Fu/8WTLi2t JFRbY0tba0 NDQzMv2qUP 91829K3NtF ehn4uWcQrf +L7a/80hoA YMyJarPziy 2uCoDOLQDI 3fti0zgAgK Sobx3Xv7oP TTwviQJBuo 2xcVZWlhGX wzISF/QP/U +Hv6Gvvmck Pu6P8tBdOf FMYYqALq4b Ky0lTcinZ6 QzWRy64Z+H +B8H/nUeBk GceA6fwxNF hImmjMtLEL Wbx+YKuGk8 Opf3n5r4D8 P+pMW5FonS +BFQY4yA1H UqQH7tBygK ESDR+8Vd/6 NvvvgwIH55 4SqTi3P/7z f9Z8Gl4iWD m/A5ziUohM 4S8jMX98TP EqABAUgCKp AHykAd6ABD YAasgC1wBG 7AG/iDEBAJ VgMWSASpgA +yQB7YBApB MdgJ9oBqUA caQTNoBcdB JzgFzoNL4B q4AW6D+2AU TIBnYBa8Bg sQBGEhMkSB 5CEVSBPSh8 wgBmQPuUG+ UBAUCcVCCR APEkJ50Gao GCqDqqF6qB n6HjoJnYeu QIPQXWgMmo Z+h97BCEyC qbASrAUbww zYCfaBQ+BV cAK8Bs6FC+ AdcCXcAB+F O+Dz8DX4Nj wKP4PnEIAQ ERqiihgiDM QF8UeikHiE j6xHipAKpA FpRbqRPuQm MorMIG9RGB QFRUcZomxR nqhQFAu1Br UeVYKqRh1G daB6UTdRY6 hZ1Ec0Ga2I 1kfboL3QEe gEdBa6EF2B bkK3oy+ib6 Mn0K8xGAwN o42xwnhiIj FJmLWYEsw+ TBvmHGYQM4 6Zw2Kx8lh9 rB3WH8vECr CF2CrsUexZ 7BB2AvsGR8 Sp4Mxw7rgo HA+Xj6vAHc GdwQ3hJnEL eCm8Jt4G74 9n43PwpfhG fDf+On4Cv0 CQJmgT7Agh hCTCJkIloZ VwkfCA8JJI JKoRrYmBRC 5xI7GSeIx4 mThGfEuSIe mRXEjRJCFp B+kQ6RzpLu klmUzWIjuS o8gC8g5yM/ kC+RH5jQRF wkjCS4ItsU GiRqJDYkji uSReUlPSSX K1ZK5kheQJ yeuSM1J4KS 0pFymm1Hqp GqmTUiNSc9 IUaVNpf+lU 6RLpI9JXpK dksDJaMm4y bJkCmYMyF2 TGKQhFneJC YVE2UxopFy kTVAxVm+pF TaIWU7+jDl BnZWVkl8mG yWbL1sielh 2lITQtmhct hVZKO04bpr 1borTEaQln yfYlrUuGls zLLZVzlOPI Fcm1yd2Wey dPl3eTT5bf Jd8p/1ABpa CnEKiQpbBf 4aLCzFLqUt ulrKVFS48v vacIK+opBi muVTyo2K84 p6Ss5KGUrl SldEFpRpmm 7KicpFyufE Z5WoWiYq/C VSlXOavylC 5Ld6Kn0Cvp vfRZVUVVT1 Whar3qgOqC mrZaqFq+Wp vaQ3WCOkM9 Xr1cvUd9Vk NFw08jT6NF 454mXpOhma i5V7NPc15L Wytca6tWp9 aUtpy2l3au dov2Ax2yjo POGp0GnVu6 GF2GbrLuPt 0berCehV6i Xo3edX1Y31 Kfq79Pf9AA bWBtwDNoMB gxJBk6GWYa thiOGdGMfI 3yjTqNnhtr GEcZ7zLuM/ 5oYmGSYtJo ct9UxtTbNN +02/R3Mz0z llmN2S1zsr m7+QbzLvMX y/SXcZbtX3 bHgmLhZ7HV osfig6WVJd +y1XLaSsMq 1qrWaoRBZQ QwShiXrdHW ztYbrE9Zv7 WxtBHYHLf5 zdbQNtn2iO 3Ucu3lnOWN y8ft1OyYdv V2o/Z0+1j7 A/ajDqoOTI cGh8eO6o5s xybHSSddpy Sno07PnU2c +c7tzvMuNi 7rXM65Iq4e rkWuA24ybq Fu1W6P3NXc E9xb3Gc9LD zWepzzRHv6 eO7yHPFS8m J5NXvNelt5 r/Pu9SH5BP tU+zz21fPl +3b7wX7efr v9HqzQXMFb 0ekP/L38d/ s/DNAOWBPw YyAmMCCwJv BJkGlQXlBf MCU4JvhI8O sQ55DSkPuh OqHC0J4wyb DosOaw+XDX 8LLw0QjjiH UR1yIVIrmR XVHYqLCopq i5lW4r96yc iLaILoweXq W9KnvVldUK q1NWn46RjG HGnIhFx4bH Hol9z/RnNj Dn4rziauNm WS6svaxnbE d2OXuaY8cp 40zG28WXxU 8l2CXsTphO dEisSJzhun CruS+SPJPq kuaT/ZMPJX 9KCU9pS8Wl xqae5Mnwkn m9acpp2WmD 6frphemja2 zW7Fkzy/fh N2VAGasyug RU0c9Uv1BH uEU4lmmfWZ P5Jiss60S2 dDYvuz9HL2 d7zmSue+63 a1FrWWt78l TzNuWNrXNa V78eWh+3vm eD+oaCDRMb PTYe3kTYlL zpp3yT/LL8 V5vDN3cXKB VsLBjf4rGl pVCikF84st V2a9021Dbu toHt5turtn 8sYhddLTYp rih+X8Iquf qN6TeV33za Eb9joNSydP 9OzE7ezuFd DrsOl0mX5Z aN7/bb3VFO Ly8qf7UnZs +VimUVdXsJ e4V7Ryt9K7 uqNKp2Vr2v Tqy+XeNc01 arWLu9dn4f e9/Qfsf9rX VKdcV17w5w D9yp96jvaN BqqDiIOZh5 8EljWGPft4 xvm5sUmoqb PhziHRo9HH S4t9mqufmI 4pHSFrhF2D J9NProje9c v+tqNWytb6 O1FR8Dx4TH nn4f+/3wcZ /jPScYJ1p/ 0Pyhtp3SXt QBdeR0zHYm do52RXYNnv Q+2dNt293+ o9GPh06pnq o5LXu69Azh TMGZT2dzz8 6dSz83cz7h /HhPTM/9Cx EXbvUG9g5c 9Ll4+ZL7pQ t9Tn1nL9td PnXF5srJq4 yrndcsr3X0 W/S3/2TxU/ uA5UDHdavr XTesb3QPLh 88M+QwdP6m 681Lt7xuXb u94vbgcOjw nZHokdE77D tTd1PuvriX eW/h/sYH6A dFD6UeVjxS fNTws+7Pba OWo6fHXMf6 Hwc/vj/OGn /2S8Yv7ycK npCfVEyqTD ZPmU2dmnaf vvF05dOJZ+ nPFmYKf5X+ tfa5zvMffn P8rX82Ynbi Bf/Fp99LXs q/PPRq2aue uYC5R69TXy /MF72Rf3P4 LeNt37vwd5 MLWe+x7ys/ 6H7o/ujz8c Gn1E+f/gUD mPP8usTo0w AAAAlwSFlz AAAOwwAADs MBx2+oZAAA AXRJREFUOE +NkztLA0EU hVcFg4U2go UgWKxVKnGN qKCBKBYGZB VUkO1iEfHR +0ZSCoKNIG IjwR+ghb2V v8DeVlDBLi YZ7zfM6Oyy PorD5J57zp ndvTeeUioV LcOzgeBFoB xQB64uZrJA JGi25oofQb RVnVnfPeWk hndDXNOlae rbEN/cPyxJ zxf0cVLDC1 6tzw1odoyH z9zWXVh+5B Q+Y/sGGZ6E CyxnzbeQe2 dXq1JzW86c rlkju1g+QC uoUGOuQLSP zr0L0WWFwq 0ZoZTfAYfn 1QCt6VUQ1o 057wr9sLST FiDgtfImpE 6AKpS3TxKi 3wI08NDTAU PRJu8eE/wV YPuejKThji Up+CmgbaT4 htezYxGwZX y4XkHNcC5q GOUMBXpD8Z Lmmy1rQA6u bPRH+8eM6m up+H10cU24 ngxaPHjtI7 FtU4JpAV+5 Z2C+dGcDjJ gRsxto0OJJ /y8YZNnMzs mFJ/mtxWlI JR1MCMYSXA yp5P+hvE94 cVhHBmDVoQ AAAABJRU5E rkJggg==</ a:ImageSou rce><a:Ima geStream i :nil="true "/><a:Name >Cloud Sto rage</a:Na me><a:Pare ntId>GE.DS </a:Parent Id><a:Repr esentation >ParallelL ines</a:Re presentati on><a:Shap e i:nil="t rue"/></a: ElementTyp e><a:Eleme ntType><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibutes><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> SQL Relati onal Datab ase</b:Val ue></a:Att ributeValu es><a:Disp layName>St ore Type</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>storeTy pe</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute></a: Attributes ><a:Availa bleToBaseM odels xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. ExternalSt orage.OM"/ ><a:Behavi or i:nil=" true"/><a: Descriptio n> | |
64 | A re presentati on of a SQ L Database . | |
65 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.SQL</ a:Id><a:Im ageLocatio n>Lower ri ght of ste ncil</a:Im ageLocatio n><a:Image Source>iVB ORw0KGgoAA AANSUhEUgA AABAAAAAQC AYAAAAf8/9 hAAAABGdBT UEAALGOfPt RkwAAACBjS FJNAACHDwA AjA8AAP1SA ACBQAAAfXk AAOmLAAA85 QAAGcxzPIV 3AAAKOWlDQ 1BQaG90b3N ob3AgSUNDI HByb2ZpbGU AAEjHnZZ3V FTXFofPvXd 6oc0wAlKG3 rvAANJ7k15 FYZgZYCgDD jM0sSGiAhF FRJoiSFDEg NFQJFZEsRA UVLAHJAgoM RhFVCxvRta Lrqy89/Ly+ +Osb+2z97n 77L3PWhcAk qcvl5cGSwG QyhPwgzyc6 RGRUXTsAIA BHmCAKQBMV ka6X7B7CBD Jy82FniFyA l8EAfB6WLw CcNPQM4BOB /+fpFnpfIH omAARm7M5G SwRF4g4JUu QLrbPipgal yxmGCVmvih BEcuJOWGRD T77LLKjmNm pPLaIxTmns 1PZYu4V8bZ MIUfEiK+IC zO5nCwR3xK xRoowlSviN +LYVA4zAwA USWwXcFiJI jYRMYkfEuQ i4uUA4EgJX 3HcVyzgZAv El3JJS8/hc xMSBXQdli7 d1NqaQffkZ KVwBALDACY rmcln013SU tOZvBwAFu/ 8WTLi2tJFR bY0tba0NDQ zMv2qUP918 29K3NtFehn 4uWcQrf+L7 a/80hoAYMy JarPziy2uC oDOLQDI3ft i0zgAgKSob x3Xv7oPTTw viQJBuo2xc VZWlhGXwzI SF/QP/U+Hv 6GvvmckPu6 P8tBdOfFMY YqALq4bKy0 lTcinZ6QzW Ry64Z+H+B8 H/nUeBkGce A6fwxNFhIm mjMtLELWbx +YKuGk8Opf 3n5r4D8P+p MW5FonS+BF QY4yA1HUqQ H7tBygKESD R+8Vd/6Nvv vgwIH554Sq Ti3P/7zf9Z 8Gl4iWDm/A 5ziUohM4S8 jMX98TPEqA BAUgCKpAHy kAd6ABDYAa sgC1wBG7AG /iDEBAJVgM WSASpgA+yQ B7YBApBMdg J9oBqUAcaQ TNoBcdBJzg FzoNL4Bq4A W6D+2AUTIB nYBa8BgsQB GEhMkSB5CE VSBPSh8wgB mQPuUG+UBA UCcVCCRAPE kJ50GaoGCq DqqF6qBn6H joJnYeuQIP QXWgMmoZ+h 97BCEyCqbA SrAUbwwzYC faBQ+BVcAK 8Bs6FC+Adc CXcAB+FO+D z8DX4NjwKP 4PnEIAQERq iihgiDMQF8 UeikHiEj6x HipAKpAFpR bqRPuQmMor MIG9RGBQFR UcZomxRnqh QFAu1BrUeV YKqRh1GdaB 6UTdRY6hZ1 Ec0Ga2I1kf boL3QEegEd Ba6EF2BbkK 3oy+ib6Mn0 K8xGAwNo42 xwnhiIjFJm LWYEsw+TBv mHGYQM46Zw 2Kx8lh9rB3 WH8vECrCF2 CrsUexZ7BB 2AvsGR8Sp4 Mxw7rgoHA+ Xj6vAHcGdw Q3hJnELeCm 8Jt4G749n4 3PwpfhGfDf +On4Cv0CQJ mgT7AghhCT CJkIloZVwk fCA8JJIJKo RrYmBRC5xI 7GSeIx4mTh GfEuSIemRX EjRJCFpB+k Q6RzpLuklm UzWIjuSo8g C8g5yM/kC+ RH5jQRFwkj CS4ItsUGiR qJDYkjiuSR eUlPSSXK1Z K5kheQJyeu SM1J4KS0pF ymm1HqpGqm TUiNSc9IUa VNpf+lU6RL pI9JXpKdks DJaMm4ybJk CmYMyF2TGK QhFneJCYVE 2UxopFykTV AxVm+pFTaI WU7+jDlBnZ WVkl8mGyWb L1sielh2lI TQtmhcthVZ KO04bpr1bo rTEaQlnyfY lrUuGlszLL ZVzlOPIFcm 1yd2WeydPl 3eTT5bfJd8 p/1ABpaCnE KiQpbBf4aL CzFLqUtulr KVFS48vvac IK+opBimuV Tyo2K84p6S s5KGUrlSld EFpRpmm7Ki cpFyufEZ5W oWiYq/CVSl XOavylC5Ld 6Kn0CvpvfR ZVUVVT1Wha r3qgOqCmrZ aqFq+WpvaQ 3WCOkM9Xr1 cvUd9VkNFw 08jT6NF454 mXpOhmai5V 7NPc15LWyt ca6tWp9aUt py2l3audov 2Ax2yjoPOG p0GnVu6GF2 GbrLuPt0be rCehV6iXo3 edX1Y31Kfq 79Pf9AAbWB twDNoMBgxJ Bk6GWYathi OGdGMfI3yj TqNnhtrGEc Z7zLuM/5oY mGSYtJoct9 UxtTbNN+02 /R3Mz0zllm N2S1zsrm7+ QbzLvMXy/S XcZbtX3bHg mLhZ7HVosf ig6WVJd+y1 XLaSsMq1qr WaoRBZQQwS hiXrdHWztY brE9Zv7Wxt BHYHLf5zdb QNtn2iO3Uc u3lnOWNy8f t1OyYdvV2o /Z0+1j7A/a jDqoOTIcGh 8eO6o5sxyb HSSddpySno 07PnU2c+c7 tzvMuNi7rX M65Iq4erkW uA24ybqFu1 W6P3NXcE9x b3Gc9LDzWe pzzRHv6eO7 yHPFS8mJ5N XvNelt5r/P u9SH5BPtU+ zz21fPl+3b 7wX7efrv9H qzQXMFb0ek P/L38d/s/D NAOWBPwYyA mMCCwJvBJk GlQXlBfMCU 4JvhI8OsQ5 5DSkPuhOqH C0J4wybDos Oaw+XDX8LL w0QjjiHUR1 yIVIrmRXVH YqLCopqi5l W4r96yciLa ILoweXqW9K nvVldUKq1N Wn46RjGHGn IhFx4bHHol 9z/RnNjDn4 rziauNmWS6 svaxnbEd2O XuaY8cp40z G28WXxU8l2 CXsTphOdEi sSJzhunCru S+SPJPqkua T/ZMPJX9KC U9pS8Wlxqa e5Mnwknm9a cpp2WmD6fr phemja2zW7 Fkzy/fhN2V AGasyugRU0 c9Uv1BHuEU 4lmmfWZP5J iss60S2dDY vuz9HL2d7z mSue+63a1F rWWt78lTzN uWNrXNaV78 eWh+3vmeD+ oaCDRMbPTY e3kTYlLzpp 3yT/LL8V5v DN3cXKBVsL Bjf4rGlpVC ikF84stV2a 9021DbutoH t5turtn8sY hddLTYprih +X8IqufqN6 TeV33zaEb9 joNSydP9Oz E7ezuFdDrs Ol0mX5ZaN7 /bb3VFOLy8 qf7UnZs+Vi mUVdXsJe4V 7Ryt9K7uqN Kp2Vr2vTqy +XeNc01arW Lu9dn4fe9/ Qfsf9rXVKd cV17w5wD9y p96jvaNBqq DiIOZh58El jWGPft4xvm 5sUmoqbPhz iHRo9HHS4t 9mqufmI4pH SFrhF2DJ9N Proje9cv+t qNWytb6O1F R8Dx4THnn4 f+/3wcZ/jP ScYJ1p/0Py htp3SXtQBd eR0zHYmdo5 2RXYNnvQ+2 dNt293+o9G Ph06pnqo5L Xu69AzhTMG ZT2dzz86dS z83cz7h/Hh PTM/9CxEXb vUG9g5c9Ll 4+ZL7pQt9T n1nL9tdPnX F5srJq4yrn dcsr3X0W/S 3/2TxU/uA5 UDHdavrXTe sb3QPLh88M +QwdP6m681 Lt7xuXbu94 vbgcOjwnZH okdE77DtTd 1PuvriXeW/ h/sYH6AdFD 6UeVjxSfNT ws+7PbaOWo 6fHXMf6Hwc /vj/OGn/2S 8Yv7ycKnpC fVEyqTDZPm U2dmnafvvF 05dOJZ+nPF mYKf5X+tfa 5zvMffnP8r X82YnbiBf/ Fp99LXsq/P PRq2aueuYC 5R69TXy/MF 72Rf3P4LeN t37vwd5MLW e+x7ys/6H7 o/ujz8cGn1 E+f/gUDmPP 8usTo0wAAA AlwSFlzAAA OxAAADsQBl SsOGwAAASJ JREFUOE99k j1Ow0AQhQ2 IjsJHSA7Bj 4SJZCmpiNL QUSJRIwpQO AItSgvKDXI e6lyAAgkoy PA+s2vtrr2 O9Ekz895Md rxbmFmxd3y 5FB9iJ6wH6 uhL/CE0I9j +yXx3NLnaX tw+vKZQR8e HPx1gGJRMx bkY9UB9ig+ /fvEAx694F 6wD10FMHb3 xdgZwzMOzx afi7DdAx0f eGTBe3Dwrq cVsAPRR7wB HtEJoSmBYm 2dX8AbFlfj ydQd51Q7Ir OCbw8aUanA F3f230yI4L e8CfXAFH4f gk1Y7/7+pb wXVm+O7R0b eNituXi8Uf pJIVyhdHTZ ucNQMfOk6t 8LB6fzH52I jomZ0f5+89 84tPL683YU NKeh+QI7ya bW+T07S/DN 1Myv/AMyfA kxuIUzjAAA AAElFTkSuQ mCC</a:Ima geSource>< a:ImageStr eam i:nil= "true"/><a :Name>SQL Database</ a:Name><a: ParentId>G E.DS</a:Pa rentId><a: Representa tion>Paral lelLines</ a:Represen tation><a: Shape i:ni l="true"/> </a:Elemen tType><a:E lementType ><a:IsExte nsion>fals e</a:IsExt ension><a: Attributes ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>Non Re lational D atabase</b :Value></a :Attribute Values><a: DisplayNam e>Store Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>sto reType</a: Name><a:Ty pe>List</a :Type></a: Attribute> </a:Attrib utes><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
66 | A re presentati on of a no n-relation al databas e. | |
67 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.NoSQL </a:Id><a: ImageLocat ion>Lower right of s tencil</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA QtJREFUOE9 9krFKA0EQh s8EO4t7hOQ hokLOQCBWO a6xsxSsQ4q E+Ai2kjYhr 5XaF7AQ1MK M88nOsdnb3 YMPdv7/37m d2ytEpLgYz TfKh3JSJAI 6/oa8D5sxp Hddn64mD+9 3z6tdCDo+O fJhAyGgxUw ZK4MI6DNy5 PU5b+D4VY4 K48Cjt0bH/ 892GnDMy9v mU9fJb4BPj rrTYNg8vWo xVe4z4A+iD RxnI/ihAJq 1dXIEC+i6U r5Md1BXbYP ECLbZ3xhSZ UfQu/92Xgf +C/zsCLbOk RxB9fb4vm6 YV7g3U4Qjl E7Pwpeepkb o39Q/VsfAt /vkf+/cwvp tv4htNPCtQ YryZXtYhie hRheR8g/o7 QMp4dB2sAA AAABJRU5Er kJggg==</a :ImageSour ce><a:Imag eStream i: nil="true" /><a:Name> Non Relati onal Datab ase</a:Nam e><a:Paren tId>GE.DS< /a:ParentI d><a:Repre sentation> ParallelLi nes</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N TFS</b:Val ue><b:Valu e>ExFAT</b :Value><b: Value>FAT< /b:Value>< b:Value>Re FS</b:Valu e><b:Value >IFS</b:Va lue><b:Val ue>UDF</b: Value><b:V alue>Other </b:Value> </a:Attrib uteValues> <a:Display Name>File System Typ e</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>fsT ype</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> File Syste m</b:Value ></a:Attri buteValues ><a:Displa yName>Stor e Type</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>St atic</a:Mo de><a:Name >storeType </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute></a:At tributes>< a:Availabl eToBaseMod els xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Ex ternalStor age.OM"/>< a:Behavior i:nil="tr ue"/><a:De scription> | |
68 | A re presentati on of a fi le system. | |
69 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.FS</a :Id><a:Ima geLocation >Lower rig ht of sten cil</a:Ima geLocation ><a:ImageS ource>iVBO Rw0KGgoAAA ANSUhEUgAA ABAAAAAQCA YAAAAf8/9h AAAABGdBTU EAALGOfPtR kwAAACBjSF JNAACHDwAA jA8AAP1SAA CBQAAAfXkA AOmLAAA85Q AAGcxzPIV3 AAAKOWlDQ1 BQaG90b3No b3AgSUNDIH Byb2ZpbGUA AEjHnZZ3VF TXFofPvXd6 oc0wAlKG3r vAANJ7k15F YZgZYCgDDj M0sSGiAhFF RJoiSFDEgN FQJFZEsRAU VLAHJAgoMR hFVCxvRtaL rqy89/Ly++ Osb+2z97n7 7L3PWhcAkq cvl5cGSwGQ yhPwgzyc6R GRUXTsAIAB HmCAKQBMVk a6X7B7CBDJ y82FniFyAl 8EAfB6WLwC cNPQM4BOB/ +fpFnpfIHo mAARm7M5GS wRF4g4JUuQ LrbPipgaly xmGCVmvihB EcuJOWGRDT 77LLKjmNmp PLaIxTmns1 PZYu4V8bZM IUfEiK+ICz O5nCwR3xKx RoowlSviN+ LYVA4zAwAU SWwXcFiJIj YRMYkfEuQi 4uUA4EgJX3 HcVyzgZAvE l3JJS8/hcx MSBXQdli7d 1NqaQffkZK VwBALDACYr mcln013SUt OZvBwAFu/8 WTLi2tJFRb Y0tba0NDQz Mv2qUP9182 9K3NtFehn4 uWcQrf+L7a /80hoAYMyJ arPziy2uCo DOLQDI3fti 0zgAgKSobx 3Xv7oPTTwv iQJBuo2xcV ZWlhGXwzIS F/QP/U+Hv6 GvvmckPu6P 8tBdOfFMYY qALq4bKy0l TcinZ6QzWR y64Z+H+B8H /nUeBkGceA 6fwxNFhImm jMtLELWbx+ YKuGk8Opf3 n5r4D8P+pM W5FonS+BFQ Y4yA1HUqQH 7tBygKESDR +8Vd/6Nvvv gwIH554SqT i3P/7zf9Z8 Gl4iWDm/A5 ziUohM4S8j MX98TPEqAB AUgCKpAHyk Ad6ABDYAas gC1wBG7AG/ iDEBAJVgMW SASpgA+yQB 7YBApBMdgJ 9oBqUAcaQT NoBcdBJzgF zoNL4Bq4AW 6D+2AUTIBn YBa8BgsQBG EhMkSB5CEV SBPSh8wgBm QPuUG+UBAU CcVCCRAPEk J50GaoGCqD qqF6qBn6Hj oJnYeuQIPQ XWgMmoZ+h9 7BCEyCqbAS rAUbwwzYCf aBQ+BVcAK8 Bs6FC+AdcC XcAB+FO+Dz 8DX4NjwKP4 PnEIAQERqi ihgiDMQF8U eikHiEj6xH ipAKpAFpRb qRPuQmMorM IG9RGBQFRU cZomxRnqhQ FAu1BrUeVY KqRh1GdaB6 UTdRY6hZ1E c0Ga2I1kfb oL3QEegEdB a6EF2BbkK3 oy+ib6Mn0K 8xGAwNo42x wnhiIjFJmL WYEsw+TBvm HGYQM46Zw2 Kx8lh9rB3W H8vECrCF2C rsUexZ7BB2 AvsGR8Sp4M xw7rgoHA+X j6vAHcGdwQ 3hJnELeCm8 Jt4G749n43 PwpfhGfDf+ On4Cv0CQJm gT7AghhCTC JkIloZVwkf CA8JJIJKoR rYmBRC5xI7 GSeIx4mThG fEuSIemRXE jRJCFpB+kQ 6RzpLuklmU zWIjuSo8gC 8g5yM/kC+R H5jQRFwkjC S4ItsUGiRq JDYkjiuSRe UlPSSXK1ZK 5kheQJyeuS M1J4KS0pFy mm1HqpGqmT UiNSc9IUaV Npf+lU6RLp I9JXpKdksD JaMm4ybJkC mYMyF2TGKQ hFneJCYVE2 UxopFykTVA xVm+pFTaIW U7+jDlBnZW Vkl8mGyWbL 1sielh2lIT QtmhcthVZK O04bpr1bor TEaQlnyfYl rUuGlszLLZ VzlOPIFcm1 yd2WeydPl3 eTT5bfJd8p /1ABpaCnEK iQpbBf4aLC zFLqUtulrK VFS48vvacI K+opBimuVT yo2K84p6Ss 5KGUrlSldE FpRpmm7Kic pFyufEZ5Wo WiYq/CVSlX OavylC5Ld6 Kn0CvpvfRZ VUVVT1Whar 3qgOqCmrZa qFq+WpvaQ3 WCOkM9Xr1c vUd9VkNFw0 8jT6NF454m XpOhmai5V7 NPc15LWytc a6tWp9aUtp y2l3audov2 Ax2yjoPOGp 0GnVu6GF2G brLuPt0ber CehV6iXo3e dX1Y31Kfq7 9Pf9AAbWBt wDNoMBgxJB k6GWYathiO GdGMfI3yjT qNnhtrGEcZ 7zLuM/5oYm GSYtJoct9U xtTbNN+02/ R3Mz0zllmN 2S1zsrm7+Q bzLvMXy/SX cZbtX3bHgm LhZ7HVosfi g6WVJd+y1X LaSsMq1qrW aoRBZQQwSh iXrdHWztYb rE9Zv7WxtB HYHLf5zdbQ Ntn2iO3Ucu 3lnOWNy8ft 1OyYdvV2o/ Z0+1j7A/aj DqoOTIcGh8 eO6o5sxybH SSddpySno0 7PnU2c+c7t zvMuNi7rXM 65Iq4erkWu A24ybqFu1W 6P3NXcE9xb 3Gc9LDzWep zzRHv6eO7y HPFS8mJ5NX vNelt5r/Pu 9SH5BPtU+z z21fPl+3b7 wX7efrv9Hq zQXMFb0ekP /L38d/s/DN AOWBPwYyAm MCCwJvBJkG lQXlBfMCU4 JvhI8OsQ55 DSkPuhOqHC 0J4wybDosO aw+XDX8LLw 0QjjiHUR1y IVIrmRXVHY qLCopqi5lW 4r96yciLaI LoweXqW9Kn vVldUKq1NW n46RjGHGnI hFx4bHHol9 z/RnNjDn4r ziauNmWS6s vaxnbEd2OX uaY8cp40zG 28WXxU8l2C XsTphOdEis SJzhunCruS +SPJPqkuaT /ZMPJX9KCU 9pS8Wlxqae 5Mnwknm9ac pp2WmD6frp hemja2zW7F kzy/fhN2VA GasyugRU0c 9Uv1BHuEU4 lmmfWZP5Ji ss60S2dDYv uz9HL2d7zm Sue+63a1Fr WWt78lTzNu WNrXNaV78e Wh+3vmeD+o aCDRMbPTYe 3kTYlLzpp3 yT/LL8V5vD N3cXKBVsLB jf4rGlpVCi kF84stV2a9 021DbutoHt 5turtn8sYh ddLTYprih+ X8IqufqN6T eV33zaEb9j oNSydP9OzE 7ezuFdDrsO l0mX5ZaN7/ bb3VFOLy8q f7UnZs+Vim UVdXsJe4V7 Ryt9K7uqNK p2Vr2vTqy+ XeNc01arWL u9dn4fe9/Q fsf9rXVKdc V17w5wD9yp 96jvaNBqqD iIOZh58Elj WGPft4xvm5 sUmoqbPhzi HRo9HHS4t9 mqufmI4pHS FrhF2DJ9NP roje9cv+tq NWytb6O1FR 8Dx4THnn4f +/3wcZ/jPS cYJ1p/0Pyh tp3SXtQBde R0zHYmdo52 RXYNnvQ+2d Nt293+o9GP h06pnqo5LX u69AzhTMGZ T2dzz86dSz 83cz7h/HhP TM/9CxEXbv UG9g5c9Ll4 +ZL7pQt9Tn 1nL9tdPnXF 5srJq4yrnd csr3X0W/S3 /2TxU/uA5U DHdavrXTes b3QPLh88M+ QwdP6m681L t7xuXbu94v bgcOjwnZHo kdE77DtTd1 PuvriXeW/h /sYH6AdFD6 UeVjxSfNTw s+7PbaOWo6 fHXMf6Hwc/ vj/OGn/2S8 Yv7ycKnpCf VEyqTDZPmU 2dmnafvvF0 5dOJZ+nPFm YKf5X+tfa5 zvMffnP8rX 82YnbiBf/F p99LXsq/PP Rq2aueuYC5 R69TXy/MF7 2Rf3P4LeNt 37vwd5MLWe +x7ys/6H7o /ujz8cGn1E +f/gUDmPP8 usTo0wAAAA lwSFlzAAAO xAAADsQBlS sOGwAAASFJ REFUOE9j+P //PwOjqfd/ InE8SD0yJt UAEEYxBMUA IHDFhZEMQD EE3QC4yegY STOKISiSMM XYMJJGZKyP IomsASp+GY iLoHwM76gE pnhiNQDIPg fEZ5nMfH6z Wfo/ArIfA3 EbkjxYvW5E lg9WA/jsQ6 6B+OxW/m+Z zX1+gthA27 ph8jD1WA0A 0seAmr5zWg e+LZs0L9sq qXgui7nvdy B+CZS7TNAA oIYufofQ20 ANXwSdwhoF HMO2Ag38Le oaecYysXgS QQOAWBZo+x MQHxgGf4D0 PxBbyT9pBV BOHlk9zjAA SizWj8xeAw pEcbfoc0D+ ervUskKYPE EDgFgViNWE nSOuAp3dCW SrA7E4VI4o A2DYDIhl0c RwG0AqpoIB WT4AXz0GcR bZcbEAAAAA SUVORK5CYI I=</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>File System</a: Name><a:Pa rentId>GE. DS</a:Pare ntId><a:Re presentati on>Paralle lLines</a: Representa tion><a:Sh ape i:nil= "true"/></ a:ElementT ype><a:Ele mentType>< a:IsExtens ion>false< /a:IsExten sion><a:At tributes>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>Registry </b:Value> </a:Attrib uteValues> <a:Display Name>Store Type</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Sta tic</a:Mod e><a:Name> storeType< /a:Name><a :Type>List </a:Type>< /a:Attribu te></a:Att ributes><a :Available ToBaseMode ls xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Ext ernalStora ge.OM"/><a :Behavior i:nil="tru e"/><a:Des cription> | |
70 | A re presentati on of a Re gistry. | |
71 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.Regis try</a:Id> <a:ImageLo cation>Low er right o f stencil< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA BGdBTUEAAL GOfPtRkwAA ACBjSFJNAA CHDwAAjA8A AP1SAACBQA AAfXkAAOmL AAA85QAAGc xzPIV3AAAK OWlDQ1BQaG 90b3Nob3Ag SUNDIHByb2 ZpbGUAAEjH nZZ3VFTXFo fPvXd6oc0w AlKG3rvAAN J7k15FYZgZ YCgDDjM0sS GiAhFFRJoi SFDEgNFQJF ZEsRAUVLAH JAgoMRhFVC xvRtaLrqy8 9/Ly++Osb+ 2z97n77L3P WhcAkqcvl5 cGSwGQyhPw gzyc6RGRUX TsAIABHmCA KQBMVka6X7 B7CBDJy82F niFyAl8EAf B6WLwCcNPQ M4BOB/+fpF npfIHomAAR m7M5GSwRF4 g4JUuQLrbP ipgalyxmGC VmvihBEcuJ OWGRDT77LL KjmNmpPLaI xTmns1PZYu 4V8bZMIUfE iK+ICzO5nC wR3xKxRoow lSviN+LYVA 4zAwAUSWwX cFiJIjYRMY kfEuQi4uUA 4EgJX3HcVy zgZAvEl3JJ S8/hcxMSBX Qdli7d1Nqa QffkZKVwBA LDACYrmcln 013SUtOZvB wAFu/8WTLi 2tJFRbY0tb a0NDQzMv2q UP91829K3N tFehn4uWcQ rf+L7a/80h oAYMyJarPz iy2uCoDOLQ DI3fti0zgA gKSobx3Xv7 oPTTwviQJB uo2xcVZWlh GXwzISF/QP /U+Hv6Gvvm ckPu6P8tBd OfFMYYqALq 4bKy0lTcin Z6QzWRy64Z +H+B8H/nUe BkGceA6fwx NFhImmjMtL ELWbx+YKuG k8Opf3n5r4 D8P+pMW5Fo nS+BFQY4yA 1HUqQH7tBy gKESDR+8Vd /6NvvvgwIH 554SqTi3P/ 7zf9Z8Gl4i WDm/A5ziUo hM4S8jMX98 TPEqABAUgC KpAHykAd6A BDYAasgC1w BG7AG/iDEB AJVgMWSASp gA+yQB7YBA pBMdgJ9oBq UAcaQTNoBc dBJzgFzoNL 4Bq4AW6D+2 AUTIBnYBa8 BgsQBGEhMk SB5CEVSBPS h8wgBmQPuU G+UBAUCcVC CRAPEkJ50G aoGCqDqqF6 qBn6HjoJnY euQIPQXWgM moZ+h97BCE yCqbASrAUb wwzYCfaBQ+ BVcAK8Bs6F C+AdcCXcAB +FO+Dz8DX4 NjwKP4PnEI AQERqiihgi DMQF8UeikH iEj6xHipAK pAFpRbqRPu QmMorMIG9R GBQFRUcZom xRnqhQFAu1 BrUeVYKqRh 1GdaB6UTdR Y6hZ1Ec0Ga 2I1kfboL3Q EegEdBa6EF 2BbkK3oy+i b6Mn0K8xGA wNo42xwnhi IjFJmLWYEs w+TBvmHGYQ M46Zw2Kx8l h9rB3WH8vE CrCF2CrsUe xZ7BB2AvsG R8Sp4Mxw7r goHA+Xj6vA HcGdwQ3hJn ELeCm8Jt4G 749n43Pwpf hGfDf+On4C v0CQJmgT7A ghhCTCJkIl oZVwkfCA8J JIJKoRrYmB RC5xI7GSeI x4mThGfEuS IemRXEjRJC FpB+kQ6Rzp LuklmUzWIj uSo8gC8g5y M/kC+RH5jQ RFwkjCS4It sUGiRqJDYk jiuSReUlPS SXK1ZK5khe QJyeuSM1J4 KS0pFymm1H qpGqmTUiNS c9IUaVNpf+ lU6RLpI9JX pKdksDJaMm 4ybJkCmYMy F2TGKQhFne JCYVE2Uxop FykTVAxVm+ pFTaIWU7+j DlBnZWVkl8 mGyWbL1sie lh2lITQtmh cthVZKO04b pr1borTEaQ lnyfYlrUuG lszLLZVzlO PIFcm1yd2W eydPl3eTT5 bfJd8p/1AB paCnEKiQpb Bf4aLCzFLq UtulrKVFS4 8vvacIK+op BimuVTyo2K 84p6Ss5KGU rlSldEFpRp mm7KicpFyu fEZ5WoWiYq /CVSlXOavy lC5Ld6Kn0C vpvfRZVUVV T1Whar3qgO qCmrZaqFq+ WpvaQ3WCOk M9Xr1cvUd9 VkNFw08jT6 NF454mXpOh mai5V7NPc1 5LWytca6tW p9aUtpy2l3 audov2Ax2y joPOGp0GnV u6GF2GbrLu Pt0berCehV 6iXo3edX1Y 31Kfq79Pf9 AAbWBtwDNo MBgxJBk6GW YathiOGdGM fI3yjTqNnh trGEcZ7zLu M/5oYmGSYt Joct9UxtTb NN+02/R3Mz 0zllmN2S1z srm7+QbzLv MXy/SXcZbt X3bHgmLhZ7 HVosfig6WV Jd+y1XLaSs Mq1qrWaoRB ZQQwShiXrd HWztYbrE9Z v7WxtBHYHL f5zdbQNtn2 iO3Ucu3lnO WNy8ft1OyY dvV2o/Z0+1 j7A/ajDqoO TIcGh8eO6o 5sxybHSSdd pySno07PnU 2c+c7tzvMu Ni7rXM65Iq 4erkWuA24y bqFu1W6P3N XcE9xb3Gc9 LDzWepzzRH v6eO7yHPFS 8mJ5NXvNel t5r/Pu9SH5 BPtU+zz21f Pl+3b7wX7e frv9HqzQXM Fb0ekP/L38 d/s/DNAOWB PwYyAmMCCw JvBJkGlQXl BfMCU4JvhI 8OsQ55DSkP uhOqHC0J4w ybDosOaw+X DX8LLw0Qjj iHUR1yIVIr mRXVHYqLCo pqi5lW4r96 yciLaILowe XqW9KnvVld UKq1NWn46R jGHGnIhFx4 bHHol9z/Rn NjDn4rziau NmWS6svaxn bEd2OXuaY8 cp40zG28WX xU8l2CXsTp hOdEisSJzh unCruS+SPJ PqkuaT/ZMP JX9KCU9pS8 Wlxqae5Mnw knm9acpp2W mD6frphemj a2zW7Fkzy/ fhN2VAGasy ugRU0c9Uv1 BHuEU4lmmf WZP5Jiss60 S2dDYvuz9H L2d7zmSue+ 63a1FrWWt7 8lTzNuWNrX NaV78eWh+3 vmeD+oaCDR MbPTYe3kTY lLzpp3yT/L L8V5vDN3cX KBVsLBjf4r GlpVCikF84 stV2a9021D butoHt5tur tn8sYhddLT Yprih+X8Iq ufqN6TeV33 zaEb9joNSy dP9OzE7ezu FdDrsOl0mX 5ZaN7/bb3V FOLy8qf7Un Zs+VimUVdX sJe4V7Ryt9 K7uqNKp2Vr 2vTqy+XeNc 01arWLu9dn 4fe9/Qfsf9 rXVKdcV17w 5wD9yp96jv aNBqqDiIOZ h58EljWGPf t4xvm5sUmo qbPhziHRo9 HHS4t9mquf mI4pHSFrhF 2DJ9NProje 9cv+tqNWyt b6O1FR8Dx4 THnn4f+/3w cZ/jPScYJ1 p/0Pyhtp3S XtQBdeR0zH Ymdo52RXYN nvQ+2dNt29 3+o9GPh06p nqo5LXu69A zhTMGZT2dz z86dSz83cz 7h/HhPTM/9 CxEXbvUG9g 5c9Ll4+ZL7 pQt9Tn1nL9 tdPnXF5srJ q4yrndcsr3 X0W/S3/2Tx U/uA5UDHda vrXTesb3QP Lh88M+QwdP 6m681Lt7xu Xbu94vbgcO jwnZHokdE7 7DtTd1Puvr iXeW/h/sYH 6AdFD6UeVj xSfNTws+7P baOWo6fHXM f6Hwc/vj/O Gn/2S8Yv7y cKnpCfVEyq TDZPmU2dmn afvvF05dOJ Z+nPFmYKf5 X+tfa5zvMf fnP8rX82Yn biBf/Fp99L Xsq/PPRq2a ueuYC5R69T Xy/MF72Rf3 P4LeNt37vw d5MLWe+x7y s/6H7o/ujz 8cGn1E+f/g UDmPP8usTo 0wAAAAlwSF lzAAAOxAAA DsQBlSsOGw AAAZxJREFU OE+Vkr1LQl EYxm9lSyFl UEuEEEFDxJ 3KOxSSUEFq YoVJECoEQY t97eocqHO0 VNgm0hC4hB Q0BEUNLUFQ TbVV9Afcnu dwj5x7uUEN v3vPed6Pc8 77vpppmoKW sbAOaiAotb 8gPgjKAbN/ bvW0dTzyiX UJdDmd3RDB bYHI1275YA fCSKXeSHLf bswXnM5uaP 5ouszTEfSK f8wTiF5wT9 0twEkzgRNn AmgpEFM1oq XzxXD3VOJJ De6cXHinbg X6QUOxs9DN +vDjBYaR2T 6iw2hyo3r9 8DhLHfusVV ShD4RTV1yD DyBuo15nEE yDYeCBgzi1 YyL+ZhWYup 4plHIo8LeV qKYmsEEHPu Xw7HwJe59i 62WnrAT2IB XpgCe84N8c Lqxj8llEik GQlU6WJhwU OFwsoE2nY4 kZvcHFOtZ3 QP8lgSvCca u4v4kgvSe0 fIsCXf47gc Uz/75Q4oYJ WHkWUbHb4O zsHVfXNaUl gqH42gkTAB /ngf1X7YQz A7sBvFoFLe mbWblnIvYY Ivsti+nhXt 5GngqNMwO7 qf0AFBEVY8 ZCOLAAAAAA SUVORK5CYI I=</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>Regis try Hive</ a:Name><a: ParentId>G E.DS</a:Pa rentId><a: Representa tion>Paral lelLines</ a:Represen tation><a: Shape i:ni l="true"/> </a:Elemen tType><a:E lementType ><a:IsExte nsion>fals e</a:IsExt ension><a: Attributes ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>Config uration</b :Value></a :Attribute Values><a: DisplayNam e>Store Ty pe</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>sto reType</a: Name><a:Ty pe>List</a :Type></a: Attribute> </a:Attrib utes><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
72 | A co nfiguratio n file, th is include s XML, INI , and INF files. | |
73 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.Confi gFile</a:I d><a:Image Location>L ower right of stenci l</a:Image Location>< a:ImageSou rce>iVBORw 0KGgoAAAAN SUhEUgAAAB AAAAAQCAYA AAAf8/9hAA AABGdBTUEA ALGOfPtRkw AAACBjSFJN AACHDwAAjA 8AAP1SAACB QAAAfXkAAO mLAAA85QAA GcxzPIV3AA AKOWlDQ1BQ aG90b3Nob3 AgSUNDIHBy b2ZpbGUAAE jHnZZ3VFTX FofPvXd6oc 0wAlKG3rvA ANJ7k15FYZ gZYCgDDjM0 sSGiAhFFRJ oiSFDEgNFQ JFZEsRAUVL AHJAgoMRhF VCxvRtaLrq y89/Ly++Os b+2z97n77L 3PWhcAkqcv l5cGSwGQyh Pwgzyc6RGR UXTsAIABHm CAKQBMVka6 X7B7CBDJy8 2FniFyAl8E AfB6WLwCcN PQM4BOB/+f pFnpfIHomA ARm7M5GSwR F4g4JUuQLr bPipgalyxm GCVmvihBEc uJOWGRDT77 LLKjmNmpPL aIxTmns1PZ Yu4V8bZMIU fEiK+ICzO5 nCwR3xKxRo owlSviN+LY VA4zAwAUSW wXcFiJIjYR MYkfEuQi4u UA4EgJX3Hc VyzgZAvEl3 JJS8/hcxMS BXQdli7d1N qaQffkZKVw BALDACYrmc ln013SUtOZ vBwAFu/8WT Li2tJFRbY0 tba0NDQzMv 2qUP91829K 3NtFehn4uW cQrf+L7a/8 0hoAYMyJar Pziy2uCoDO LQDI3fti0z gAgKSobx3X v7oPTTwviQ JBuo2xcVZW lhGXwzISF/ QP/U+Hv6Gv vmckPu6P8t BdOfFMYYqA Lq4bKy0lTc inZ6QzWRy6 4Z+H+B8H/n UeBkGceA6f wxNFhImmjM tLELWbx+YK uGk8Opf3n5 r4D8P+pMW5 FonS+BFQY4 yA1HUqQH7t BygKESDR+8 Vd/6Nvvvgw IH554SqTi3 P/7zf9Z8Gl 4iWDm/A5zi UohM4S8jMX 98TPEqABAU gCKpAHykAd 6ABDYAasgC 1wBG7AG/iD EBAJVgMWSA SpgA+yQB7Y BApBMdgJ9o BqUAcaQTNo BcdBJzgFzo NL4Bq4AW6D +2AUTIBnYB a8BgsQBGEh MkSB5CEVSB PSh8wgBmQP uUG+UBAUCc VCCRAPEkJ5 0GaoGCqDqq F6qBn6HjoJ nYeuQIPQXW gMmoZ+h97B CEyCqbASrA UbwwzYCfaB Q+BVcAK8Bs 6FC+AdcCXc AB+FO+Dz8D X4NjwKP4Pn EIAQERqiih giDMQF8Uei kHiEj6xHip AKpAFpRbqR PuQmMorMIG 9RGBQFRUcZ omxRnqhQFA u1BrUeVYKq Rh1GdaB6UT dRY6hZ1Ec0 Ga2I1kfboL 3QEegEdBa6 EF2BbkK3oy +ib6Mn0K8x GAwNo42xwn hiIjFJmLWY Esw+TBvmHG YQM46Zw2Kx 8lh9rB3WH8 vECrCF2Crs UexZ7BB2Av sGR8Sp4Mxw 7rgoHA+Xj6 vAHcGdwQ3h JnELeCm8Jt 4G749n43Pw pfhGfDf+On 4Cv0CQJmgT 7AghhCTCJk IloZVwkfCA 8JJIJKoRrY mBRC5xI7GS eIx4mThGfE uSIemRXEjR JCFpB+kQ6R zpLuklmUzW IjuSo8gC8g 5yM/kC+RH5 jQRFwkjCS4 ItsUGiRqJD YkjiuSReUl PSSXK1ZK5k heQJyeuSM1 J4KS0pFymm 1HqpGqmTUi NSc9IUaVNp f+lU6RLpI9 JXpKdksDJa Mm4ybJkCmY MyF2TGKQhF neJCYVE2Ux opFykTVAxV m+pFTaIWU7 +jDlBnZWVk l8mGyWbL1s ielh2lITQt mhcthVZKO0 4bpr1borTE aQlnyfYlrU uGlszLLZVz lOPIFcm1yd 2WeydPl3eT T5bfJd8p/1 ABpaCnEKiQ pbBf4aLCzF LqUtulrKVF S48vvacIK+ opBimuVTyo 2K84p6Ss5K GUrlSldEFp Rpmm7KicpF yufEZ5WoWi Yq/CVSlXOa vylC5Ld6Kn 0CvpvfRZVU VVT1Whar3q gOqCmrZaqF q+WpvaQ3WC OkM9Xr1cvU d9VkNFw08j T6NF454mXp Ohmai5V7NP c15LWytca6 tWp9aUtpy2 l3audov2Ax 2yjoPOGp0G nVu6GF2Gbr LuPt0berCe hV6iXo3edX 1Y31Kfq79P f9AAbWBtwD NoMBgxJBk6 GWYathiOGd GMfI3yjTqN nhtrGEcZ7z LuM/5oYmGS YtJoct9Uxt TbNN+02/R3 Mz0zllmN2S 1zsrm7+Qbz LvMXy/SXcZ btX3bHgmLh Z7HVosfig6 WVJd+y1XLa SsMq1qrWao RBZQQwShiX rdHWztYbrE 9Zv7WxtBHY HLf5zdbQNt n2iO3Ucu3l nOWNy8ft1O yYdvV2o/Z0 +1j7A/ajDq oOTIcGh8eO 6o5sxybHSS ddpySno07P nU2c+c7tzv MuNi7rXM65 Iq4erkWuA2 4ybqFu1W6P 3NXcE9xb3G c9LDzWepzz RHv6eO7yHP FS8mJ5NXvN elt5r/Pu9S H5BPtU+zz2 1fPl+3b7wX 7efrv9HqzQ XMFb0ekP/L 38d/s/DNAO WBPwYyAmMC CwJvBJkGlQ XlBfMCU4Jv hI8OsQ55DS kPuhOqHC0J 4wybDosOaw +XDX8LLw0Q jjiHUR1yIV IrmRXVHYqL Copqi5lW4r 96yciLaILo weXqW9KnvV ldUKq1NWn4 6RjGHGnIhF x4bHHol9z/ RnNjDn4rzi auNmWS6sva xnbEd2OXua Y8cp40zG28 WXxU8l2CXs TphOdEisSJ zhunCruS+S PJPqkuaT/Z MPJX9KCU9p S8Wlxqae5M nwknm9acpp 2WmD6frphe mja2zW7Fkz y/fhN2VAGa syugRU0c9U v1BHuEU4lm mfWZP5Jiss 60S2dDYvuz 9HL2d7zmSu e+63a1FrWW t78lTzNuWN rXNaV78eWh +3vmeD+oaC DRMbPTYe3k TYlLzpp3yT /LL8V5vDN3 cXKBVsLBjf 4rGlpVCikF 84stV2a902 1DbutoHt5t urtn8sYhdd LTYprih+X8 IqufqN6TeV 33zaEb9joN SydP9OzE7e zuFdDrsOl0 mX5ZaN7/bb 3VFOLy8qf7 UnZs+VimUV dXsJe4V7Ry t9K7uqNKp2 Vr2vTqy+Xe Nc01arWLu9 dn4fe9/Qfs f9rXVKdcV1 7w5wD9yp96 jvaNBqqDiI OZh58EljWG Pft4xvm5sU moqbPhziHR o9HHS4t9mq ufmI4pHSFr hF2DJ9NPro je9cv+tqNW ytb6O1FR8D x4THnn4f+/ 3wcZ/jPScY J1p/0Pyhtp 3SXtQBdeR0 zHYmdo52RX YNnvQ+2dNt 293+o9GPh0 6pnqo5LXu6 9AzhTMGZT2 dzz86dSz83 cz7h/HhPTM /9CxEXbvUG 9g5c9Ll4+Z L7pQt9Tn1n L9tdPnXF5s rJq4yrndcs r3X0W/S3/2 TxU/uA5UDH davrXTesb3 QPLh88M+Qw dP6m681Lt7 xuXbu94vbg cOjwnZHokd E77DtTd1Pu vriXeW/h/s YH6AdFD6Ue VjxSfNTws+ 7PbaOWo6fH XMf6Hwc/vj /OGn/2S8Yv 7ycKnpCfVE yqTDZPmU2d mnafvvF05d OJZ+nPFmYK f5X+tfa5zv MffnP8rX82 YnbiBf/Fp9 9LXsq/PPRq 2aueuYC5R6 9TXy/MF72R f3P4LeNt37 vwd5MLWe+x 7ys/6H7o/u jz8cGn1E+f /gUDmPP8us To0wAAAAlw SFlzAAAOxA AADsQBlSsO GwAAAZxJRE FUOE+Vkr1L QlEYxm9lSy FlUEuEEEFD xJ3KOxSSUE FqYoVJECoE QYt97eocqH O0VNgm0hC4 hBQ0BEUNLU FQTbVV9Afc nudwj5x7uU ENv3vPed6P c877vpppmo KWsbAOaiAo tb8gPgjKAb N/bvW0dTzy iXUJdDmd3R DBbYHI1275 YAfCSKXeSH LfbswXnM5u aP5ouszTEf SKf8wTiF5w T90twEkzgR NnAmgpEFM1 oqXzxXD3VO JJDe6cXHin bgX6QUOxs9 DN+vDjBYaR 2T6iw2hyo3 r98DhLHfus VVShD4RTV1 yDDyBuo15n EEyDYeCBgz i1YyL+ZhWY up4plHIo8L eVqKYmsEEH PuXw7HwJe5 9i62WnrAT2 IBXpgCe84N 8cLqxj8llE ikGQlU6WJh wUOFwsoE2n Y4kZvcHFOt Z3QP8lgSvC cau4v4kgvS e0fIsCXf47 gcUz/75Q4o YJWHkWUbHb 4OzsHVfXNa UlgqH42gkT AB/ngf1X7Y QzA7sBvFoF LembWblnIv YYIvsti+nh Xt5GngqNMw O7qf0AFBEV Y8ZCOLAAAA AASUVORK5C YII=</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Con figuration File</a:N ame><a:Par entId>GE.D S</a:Paren tId><a:Rep resentatio n>Parallel Lines</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >Cache</b: Value></a: AttributeV alues><a:D isplayName >Store Typ e</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Static< /a:Mode><a :Name>stor eType</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< /a:Attribu tes><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
74 | A re presentati on of a lo cal data c ache. | |
75 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.Cache </a:Id><a: ImageLocat ion>Lower right of s tencil</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA F1JREFUOE9 j+P//Pxwzm nrPB+L/BPB 5IOaH6SFVM xgzmflcANJ gQ0jWDMMwQ 8jSDMMgQ0A u0AZiVzKxB cgFWE0nFoM NcM6smoaPx oZhcpS7AIu /SMKjYTAMw sD7PwDo1eA uODnTegAAA ABJRU5ErkJ ggg==</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>Ca che</a:Nam e><a:Paren tId>GE.DS< /a:ParentI d><a:Repre sentation> ParallelLi nes</a:Rep resentatio n><a:Shape i:nil="tr ue"/></a:E lementType ><a:Elemen tType><a:I sExtension >false</a: IsExtensio n><a:Attri butes><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>H TML5 Stora ge</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Sto re Type</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>S tatic</a:M ode><a:Nam e>storeTyp e</a:Name> <a:Type>Li st</a:Type ></a:Attri bute></a:A ttributes> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
76 | A re presentati on of HTML 5 local st orage. | |
77 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.HTML5 LS</a:Id>< a:ImageLoc ation>Lowe r right of stencil</ a:ImageLoc ation><a:I mageSource >iVBORw0KG goAAAANSUh EUgAAABAAA AAQCAYAAAA f8/9hAAAAB GdBTUEAALG OfPtRkwAAA CBjSFJNAAC HDwAAjA8AA P1SAACBQAA AfXkAAOmLA AA85QAAGcx zPIV3AAAKO WlDQ1BQaG9 0b3Nob3AgS UNDIHByb2Z pbGUAAEjHn ZZ3VFTXFof PvXd6oc0wA lKG3rvAANJ 7k15FYZgZY CgDDjM0sSG iAhFFRJoiS FDEgNFQJFZ EsRAUVLAHJ AgoMRhFVCx vRtaLrqy89 /Ly++Osb+2 z97n77L3PW hcAkqcvl5c GSwGQyhPwg zyc6RGRUXT sAIABHmCAK QBMVka6X7B 7CBDJy82Fn iFyAl8EAfB 6WLwCcNPQM 4BOB/+fpFn pfIHomAARm 7M5GSwRF4g 4JUuQLrbPi pgalyxmGCV mvihBEcuJO WGRDT77LLK jmNmpPLaIx Tmns1PZYu4 V8bZMIUfEi K+ICzO5nCw R3xKxRoowl SviN+LYVA4 zAwAUSWwXc FiJIjYRMYk fEuQi4uUA4 EgJX3HcVyz gZAvEl3JJS 8/hcxMSBXQ dli7d1NqaQ ffkZKVwBAL DACYrmcln0 13SUtOZvBw AFu/8WTLi2 tJFRbY0tba 0NDQzMv2qU P91829K3Nt Fehn4uWcQr f+L7a/80ho AYMyJarPzi y2uCoDOLQD I3fti0zgAg KSobx3Xv7o PTTwviQJBu o2xcVZWlhG XwzISF/QP/ U+Hv6Gvvmc kPu6P8tBdO fFMYYqALq4 bKy0lTcinZ 6QzWRy64Z+ H+B8H/nUeB kGceA6fwxN FhImmjMtLE LWbx+YKuGk 8Opf3n5r4D 8P+pMW5Fon S+BFQY4yA1 HUqQH7tByg KESDR+8Vd/ 6NvvvgwIH5 54SqTi3P/7 zf9Z8Gl4iW Dm/A5ziUoh M4S8jMX98T PEqABAUgCK pAHykAd6AB DYAasgC1wB G7AG/iDEBA JVgMWSASpg A+yQB7YBAp BMdgJ9oBqU AcaQTNoBcd BJzgFzoNL4 Bq4AW6D+2A UTIBnYBa8B gsQBGEhMkS B5CEVSBPSh 8wgBmQPuUG +UBAUCcVCC RAPEkJ50Ga oGCqDqqF6q Bn6HjoJnYe uQIPQXWgMm oZ+h97BCEy CqbASrAUbw wzYCfaBQ+B VcAK8Bs6FC +AdcCXcAB+ FO+Dz8DX4N jwKP4PnEIA QERqiihgiD MQF8UeikHi Ej6xHipAKp AFpRbqRPuQ mMorMIG9RG BQFRUcZomx RnqhQFAu1B rUeVYKqRh1 GdaB6UTdRY 6hZ1Ec0Ga2 I1kfboL3QE egEdBa6EF2 BbkK3oy+ib 6Mn0K8xGAw No42xwnhiI jFJmLWYEsw +TBvmHGYQM 46Zw2Kx8lh 9rB3WH8vEC rCF2CrsUex Z7BB2AvsGR 8Sp4Mxw7rg oHA+Xj6vAH cGdwQ3hJnE LeCm8Jt4G7 49n43Pwpfh GfDf+On4Cv 0CQJmgT7Ag hhCTCJkIlo ZVwkfCA8JJ IJKoRrYmBR C5xI7GSeIx 4mThGfEuSI emRXEjRJCF pB+kQ6RzpL uklmUzWIju So8gC8g5yM /kC+RH5jQR FwkjCS4Its UGiRqJDYkj iuSReUlPSS XK1ZK5kheQ JyeuSM1J4K S0pFymm1Hq pGqmTUiNSc 9IUaVNpf+l U6RLpI9JXp KdksDJaMm4 ybJkCmYMyF 2TGKQhFneJ CYVE2UxopF ykTVAxVm+p FTaIWU7+jD lBnZWVkl8m GyWbL1siel h2lITQtmhc thVZKO04bp r1borTEaQl nyfYlrUuGl szLLZVzlOP IFcm1yd2We ydPl3eTT5b fJd8p/1ABp aCnEKiQpbB f4aLCzFLqU tulrKVFS48 vvacIK+opB imuVTyo2K8 4p6Ss5KGUr lSldEFpRpm m7KicpFyuf EZ5WoWiYq/ CVSlXOavyl C5Ld6Kn0Cv pvfRZVUVVT 1Whar3qgOq CmrZaqFq+W pvaQ3WCOkM 9Xr1cvUd9V kNFw08jT6N F454mXpOhm ai5V7NPc15 LWytca6tWp 9aUtpy2l3a udov2Ax2yj oPOGp0GnVu 6GF2GbrLuP t0berCehV6 iXo3edX1Y3 1Kfq79Pf9A AbWBtwDNoM BgxJBk6GWY athiOGdGMf I3yjTqNnht rGEcZ7zLuM /5oYmGSYtJ oct9UxtTbN N+02/R3Mz0 zllmN2S1zs rm7+QbzLvM Xy/SXcZbtX 3bHgmLhZ7H Vosfig6WVJ d+y1XLaSsM q1qrWaoRBZ QQwShiXrdH WztYbrE9Zv 7WxtBHYHLf 5zdbQNtn2i O3Ucu3lnOW Ny8ft1OyYd vV2o/Z0+1j 7A/ajDqoOT IcGh8eO6o5 sxybHSSddp ySno07PnU2 c+c7tzvMuN i7rXM65Iq4 erkWuA24yb qFu1W6P3NX cE9xb3Gc9L DzWepzzRHv 6eO7yHPFS8 mJ5NXvNelt 5r/Pu9SH5B PtU+zz21fP l+3b7wX7ef rv9HqzQXMF b0ekP/L38d /s/DNAOWBP wYyAmMCCwJ vBJkGlQXlB fMCU4JvhI8 OsQ55DSkPu hOqHC0J4wy bDosOaw+XD X8LLw0Qjji HUR1yIVIrm RXVHYqLCop qi5lW4r96y ciLaILoweX qW9KnvVldU Kq1NWn46Rj GHGnIhFx4b HHol9z/RnN jDn4rziauN mWS6svaxnb Ed2OXuaY8c p40zG28WXx U8l2CXsTph OdEisSJzhu nCruS+SPJP qkuaT/ZMPJ X9KCU9pS8W lxqae5Mnwk nm9acpp2Wm D6frphemja 2zW7Fkzy/f hN2VAGasyu gRU0c9Uv1B HuEU4lmmfW ZP5Jiss60S 2dDYvuz9HL 2d7zmSue+6 3a1FrWWt78 lTzNuWNrXN aV78eWh+3v meD+oaCDRM bPTYe3kTYl Lzpp3yT/LL 8V5vDN3cXK BVsLBjf4rG lpVCikF84s tV2a9021Db utoHt5turt n8sYhddLTY prih+X8Iqu fqN6TeV33z aEb9joNSyd P9OzE7ezuF dDrsOl0mX5 ZaN7/bb3VF OLy8qf7UnZ s+VimUVdXs Je4V7Ryt9K 7uqNKp2Vr2 vTqy+XeNc0 1arWLu9dn4 fe9/Qfsf9r XVKdcV17w5 wD9yp96jva NBqqDiIOZh 58EljWGPft 4xvm5sUmoq bPhziHRo9H HS4t9mqufm I4pHSFrhF2 DJ9NProje9 cv+tqNWytb 6O1FR8Dx4T Hnn4f+/3wc Z/jPScYJ1p /0Pyhtp3SX tQBdeR0zHY mdo52RXYNn vQ+2dNt293 +o9GPh06pn qo5LXu69Az hTMGZT2dzz 86dSz83cz7 h/HhPTM/9C xEXbvUG9g5 c9Ll4+ZL7p Qt9Tn1nL9t dPnXF5srJq 4yrndcsr3X 0W/S3/2TxU /uA5UDHdav rXTesb3QPL h88M+QwdP6 m681Lt7xuX bu94vbgcOj wnZHokdE77 DtTd1Puvri XeW/h/sYH6 AdFD6UeVjx SfNTws+7Pb aOWo6fHXMf 6Hwc/vj/OG n/2S8Yv7yc KnpCfVEyqT DZPmU2dmna fvvF05dOJZ +nPFmYKf5X +tfa5zvMff nP8rX82Ynb iBf/Fp99LX sq/PPRq2au euYC5R69TX y/MF72Rf3P 4LeNt37vwd 5MLWe+x7ys /6H7o/ujz8 cGn1E+f/gU DmPP8usTo0 wAAAAlwSFl zAAAOxAAAD sQBlSsOGwA AAS1JREFUO E9j+P//P0U YqyApGEOA0 dSbH4jtQTS aOEhMHlkMh FE4QAX6QPw eiP+zWfoXo on/h+J4ZD3 ImvORFP03T yhMgcm5ZFV psVr4fUaSn w/EYBfCnAw SAEuCFHYvX psOlBSFGQD EHEt37I8Qc Ay7A1PHZOZ zAUjLM0AZY EExt6gLZ6/ f8QFq4EXSD DcEiC10I7L WIhnygQHZa c6ZVQ1ARSx ImjBwRvsUf 2Q9DO0LVqW g+a8em0YQB sr5g2yFqQ0 oae4CSfCCn I3sPyCej0V zPEweKZykY ApYjl++7gI KA5giIM5H0 gyPRm7boBc gVwPFweEEt wGIQX43gQU StmgEWXDyy k13oBg8kJE NgGF1IHYFY pRoBGJHIDY BYpRAhjPIx VgFScFYBYn H/xkAObxzb hFjTVgAAAA ASUVORK5CY II=</a:Ima geSource>< a:ImageStr eam i:nil= "true"/><a :Name>HTML 5 Local St orage</a:N ame><a:Par entId>GE.D S</a:Paren tId><a:Rep resentatio n>Parallel Lines</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >No</b:Val ue><b:Valu e>Yes</b:V alue></a:A ttributeVa lues><a:Di splayName> HTTPOnly</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>HTTPOn ly</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>C ookie</b:V alue></a:A ttributeVa lues><a:Di splayName> Store Type </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Static</ a:Mode><a: Name>store Type</a:Na me><a:Type >List</a:T ype></a:At tribute></ a:Attribut es><a:Avai lableToBas eModels xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.External Storage.OM "/><a:Beha vior i:nil ="true"/>< a:Descript ion> | |
78 | A re presentati on of cook ie storage . | |
79 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.Cooki e</a:Id><a :ImageLoca tion>Lower right of stencil</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGO fPtRkwAAAC BjSFJNAACH DwAAjA8AAP 1SAACBQAAA fXkAAOmLAA A85QAAGcxz PIV3AAAKOW lDQ1BQaG90 b3Nob3AgSU NDIHByb2Zp bGUAAEjHnZ Z3VFTXFofP vXd6oc0wAl KG3rvAANJ7 k15FYZgZYC gDDjM0sSGi AhFFRJoiSF DEgNFQJFZE sRAUVLAHJA goMRhFVCxv RtaLrqy89/ Ly++Osb+2z 97n77L3PWh cAkqcvl5cG SwGQyhPwgz yc6RGRUXTs AIABHmCAKQ BMVka6X7B7 CBDJy82Fni FyAl8EAfB6 WLwCcNPQM4 BOB/+fpFnp fIHomAARm7 M5GSwRF4g4 JUuQLrbPip galyxmGCVm vihBEcuJOW GRDT77LLKj mNmpPLaIxT mns1PZYu4V 8bZMIUfEiK +ICzO5nCwR 3xKxRoowlS viN+LYVA4z AwAUSWwXcF iJIjYRMYkf EuQi4uUA4E gJX3HcVyzg ZAvEl3JJS8 /hcxMSBXQd li7d1NqaQf fkZKVwBALD ACYrmcln01 3SUtOZvBwA Fu/8WTLi2t JFRbY0tba0 NDQzMv2qUP 91829K3NtF ehn4uWcQrf +L7a/80hoA YMyJarPziy 2uCoDOLQDI 3fti0zgAgK Sobx3Xv7oP TTwviQJBuo 2xcVZWlhGX wzISF/QP/U +Hv6Gvvmck Pu6P8tBdOf FMYYqALq4b Ky0lTcinZ6 QzWRy64Z+H +B8H/nUeBk GceA6fwxNF hImmjMtLEL Wbx+YKuGk8 Opf3n5r4D8 P+pMW5FonS +BFQY4yA1H UqQH7tBygK ESDR+8Vd/6 NvvvgwIH55 4SqTi3P/7z f9Z8Gl4iWD m/A5ziUohM 4S8jMX98TP EqABAUgCKp AHykAd6ABD YAasgC1wBG 7AG/iDEBAJ VgMWSASpgA +yQB7YBApB MdgJ9oBqUA caQTNoBcdB JzgFzoNL4B q4AW6D+2AU TIBnYBa8Bg sQBGEhMkSB 5CEVSBPSh8 wgBmQPuUG+ UBAUCcVCCR APEkJ50Gao GCqDqqF6qB n6HjoJnYeu QIPQXWgMmo Z+h97BCEyC qbASrAUbww zYCfaBQ+BV cAK8Bs6FC+ AdcCXcAB+F O+Dz8DX4Nj wKP4PnEIAQ ERqiihgiDM QF8UeikHiE j6xHipAKpA FpRbqRPuQm MorMIG9RGB QFRUcZomxR nqhQFAu1Br UeVYKqRh1G daB6UTdRY6 hZ1Ec0Ga2I 1kfboL3QEe gEdBa6EF2B bkK3oy+ib6 Mn0K8xGAwN o42xwnhiIj FJmLWYEsw+ TBvmHGYQM4 6Zw2Kx8lh9 rB3WH8vECr CF2CrsUexZ 7BB2AvsGR8 Sp4Mxw7rgo HA+Xj6vAHc GdwQ3hJnEL eCm8Jt4G74 9n43PwpfhG fDf+On4Cv0 CQJmgT7Agh hCTCJkIloZ VwkfCA8JJI JKoRrYmBRC 5xI7GSeIx4 mThGfEuSIe mRXEjRJCFp B+kQ6RzpLu klmUzWIjuS o8gC8g5yM/ kC+RH5jQRF wkjCS4ItsU GiRqJDYkji uSReUlPSSX K1ZK5kheQJ yeuSM1J4KS 0pFymm1Hqp GqmTUiNSc9 IUaVNpf+lU 6RLpI9JXpK dksDJaMm4y bJkCmYMyF2 TGKQhFneJC YVE2UxopFy kTVAxVm+pF TaIWU7+jDl BnZWVkl8mG yWbL1sielh 2lITQtmhct hVZKO04bpr 1borTEaQln yfYlrUuGls zLLZVzlOPI Fcm1yd2Wey dPl3eTT5bf Jd8p/1ABpa CnEKiQpbBf 4aLCzFLqUt ulrKVFS48v vacIK+opBi muVTyo2K84 p6Ss5KGUrl SldEFpRpmm 7KicpFyufE Z5WoWiYq/C VSlXOavylC 5Ld6Kn0Cvp vfRZVUVVT1 Whar3qgOqC mrZaqFq+Wp vaQ3WCOkM9 Xr1cvUd9Vk NFw08jT6NF 454mXpOhma i5V7NPc15L Wytca6tWp9 aUtpy2l3au dov2Ax2yjo POGp0GnVu6 GF2GbrLuPt 0berCehV6i Xo3edX1Y31 Kfq79Pf9AA bWBtwDNoMB gxJBk6GWYa thiOGdGMfI 3yjTqNnhtr GEcZ7zLuM/ 5oYmGSYtJo ct9UxtTbNN +02/R3Mz0z llmN2S1zsr m7+QbzLvMX y/SXcZbtX3 bHgmLhZ7HV osfig6WVJd +y1XLaSsMq 1qrWaoRBZQ QwShiXrdHW ztYbrE9Zv7 WxtBHYHLf5 zdbQNtn2iO 3Ucu3lnOWN y8ft1OyYdv V2o/Z0+1j7 A/ajDqoOTI cGh8eO6o5s xybHSSddpy Sno07PnU2c +c7tzvMuNi 7rXM65Iq4e rkWuA24ybq Fu1W6P3NXc E9xb3Gc9LD zWepzzRHv6 eO7yHPFS8m J5NXvNelt5 r/Pu9SH5BP tU+zz21fPl +3b7wX7efr v9HqzQXMFb 0ekP/L38d/ s/DNAOWBPw YyAmMCCwJv BJkGlQXlBf MCU4JvhI8O sQ55DSkPuh OqHC0J4wyb DosOaw+XDX 8LLw0QjjiH UR1yIVIrmR XVHYqLCopq i5lW4r96yc iLaILoweXq W9KnvVldUK q1NWn46RjG HGnIhFx4bH Hol9z/RnNj Dn4rziauNm WS6svaxnbE d2OXuaY8cp 40zG28WXxU 8l2CXsTphO dEisSJzhun CruS+SPJPq kuaT/ZMPJX 9KCU9pS8Wl xqae5Mnwkn m9acpp2WmD 6frphemja2 zW7Fkzy/fh N2VAGasyug RU0c9Uv1BH uEU4lmmfWZ P5Jiss60S2 dDYvuz9HL2 d7zmSue+63 a1FrWWt78l TzNuWNrXNa V78eWh+3vm eD+oaCDRMb PTYe3kTYlL zpp3yT/LL8 V5vDN3cXKB VsLBjf4rGl pVCikF84st V2a9021Dbu toHt5turtn 8sYhddLTYp rih+X8Iquf qN6TeV33za Eb9joNSydP 9OzE7ezuFd DrsOl0mX5Z aN7/bb3VFO Ly8qf7UnZs +VimUVdXsJ e4V7Ryt9K7 uqNKp2Vr2v Tqy+XeNc01 arWLu9dn4f e9/Qfsf9rX VKdcV17w5w D9yp96jvaN BqqDiIOZh5 8EljWGPft4 xvm5sUmoqb PhziHRo9HH S4t9mqufmI 4pHSFrhF2D J9NProje9c v+tqNWytb6 O1FR8Dx4TH nn4f+/3wcZ /jPScYJ1p/ 0Pyhtp3SXt QBdeR0zHYm do52RXYNnv Q+2dNt293+ o9GPh06pnq o5LXu69Azh TMGZT2dzz8 6dSz83cz7h /HhPTM/9Cx EXbvUG9g5c 9Ll4+ZL7pQ t9Tn1nL9td PnXF5srJq4 yrndcsr3X0 W/S3/2TxU/ uA5UDHdavr XTesb3QPLh 88M+QwdP6m 681Lt7xuXb u94vbgcOjw nZHokdE77D tTd1PuvriX eW/h/sYH6A dFD6UeVjxS fNTws+7Pba OWo6fHXMf6 Hwc/vj/OGn /2S8Yv7ycK npCfVEyqTD ZPmU2dmnaf vvF05dOJZ+ nPFmYKf5X+ tfa5zvMffn P8rX82Ynbi Bf/Fp99LXs q/PPRq2aue uYC5R69TXy /MF72Rf3P4 LeNt37vwd5 MLWe+x7ys/ 6H7o/ujz8c Gn1E+f/gUD mPP8usTo0w AAAAlwSFlz AAAOxAAADs QBlSsOGwAA AGFJREFUOE 9jYDT1/k8J BhvgnFk1rW TCnGJSMdwA 1+zqsP///w uSiuEG6EZk +QAF0L1jj0 UMQw6nATAx IHbFgkEuIM 4AZDEkjN0F QIxhC5oYih yGASA2Eh4N gxEWBuRj7/ 8An7gYjzKN JXgAAAAASU VORK5CYII= </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>Cookies </a:Name>< a:ParentId >GE.DS</a: ParentId>< a:Represen tation>Par allelLines </a:Repres entation>< a:Shape i: nil="true" /></a:Elem entType><a :ElementTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut es><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>No</ b:Value><b :Value>Yes </b:Value> </a:Attrib uteValues> <a:Display Name>GPS</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>GPS</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>No</b: Value><b:V alue>Yes</ b:Value></ a:Attribut eValues><a :DisplayNa me>Contact s</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>Con tacts</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Calendar Events</a: DisplayNam e><a:Inher itance>Vir tual</a:In heritance> <a:Mode>Dy namic</a:M ode><a:Nam e>Calendar </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>No< /b:Value>< b:Value>Ye s</b:Value ></a:Attri buteValues ><a:Displa yName>SMS messages</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>SMSmes sages</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Cached Cr edentials< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Dynamic</ a:Mode><a: Name>Creds </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>No< /b:Value>< b:Value>Ye s</b:Value ></a:Attri buteValues ><a:Displa yName>Ente rprise Dat a</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>Ent erprise</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>No</b: Value><b:V alue>Yes</ b:Value></ a:Attribut eValues><a :DisplayNa me>Messagi ng Data (M ail, IM, S MS)</a:Dis playName>< a:Inherita nce>Virtua l</a:Inher itance><a: Mode>Dynam ic</a:Mode ><a:Name>e -mail</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >SIM Stora ge</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>SI M</a:Name> <a:Type>Li st</a:Type ></a:Attri bute><a:At tribute><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributeValu es xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Int erfaces">< b:Value>No </b:Value> <b:Value>Y es</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Oth er Data</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>misc</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>Device </b:Value> </a:Attrib uteValues> <a:Display Name>Store Type</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Sta tic</a:Mod e><a:Name> storeType< /a:Name><a :Type>List </a:Type>< /a:Attribu te></a:Att ributes><a :Available ToBaseMode ls xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Ext ernalStora ge.OM"/><a :Behavior i:nil="tru e"/><a:Des cription> | |
80 | A re presentati on of devi ce local s torage. | |
81 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DS.TM Core.Devic e</a:Id><a :ImageLoca tion>Lower right of stencil</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGO fPtRkwAAAC BjSFJNAACH DwAAjA8AAP 1SAACBQAAA fXkAAOmLAA A85QAAGcxz PIV3AAAKOW lDQ1BQaG90 b3Nob3AgSU NDIHByb2Zp bGUAAEjHnZ Z3VFTXFofP vXd6oc0wAl KG3rvAANJ7 k15FYZgZYC gDDjM0sSGi AhFFRJoiSF DEgNFQJFZE sRAUVLAHJA goMRhFVCxv RtaLrqy89/ Ly++Osb+2z 97n77L3PWh cAkqcvl5cG SwGQyhPwgz yc6RGRUXTs AIABHmCAKQ BMVka6X7B7 CBDJy82Fni FyAl8EAfB6 WLwCcNPQM4 BOB/+fpFnp fIHomAARm7 M5GSwRF4g4 JUuQLrbPip galyxmGCVm vihBEcuJOW GRDT77LLKj mNmpPLaIxT mns1PZYu4V 8bZMIUfEiK +ICzO5nCwR 3xKxRoowlS viN+LYVA4z AwAUSWwXcF iJIjYRMYkf EuQi4uUA4E gJX3HcVyzg ZAvEl3JJS8 /hcxMSBXQd li7d1NqaQf fkZKVwBALD ACYrmcln01 3SUtOZvBwA Fu/8WTLi2t JFRbY0tba0 NDQzMv2qUP 91829K3NtF ehn4uWcQrf +L7a/80hoA YMyJarPziy 2uCoDOLQDI 3fti0zgAgK Sobx3Xv7oP TTwviQJBuo 2xcVZWlhGX wzISF/QP/U +Hv6Gvvmck Pu6P8tBdOf FMYYqALq4b Ky0lTcinZ6 QzWRy64Z+H +B8H/nUeBk GceA6fwxNF hImmjMtLEL Wbx+YKuGk8 Opf3n5r4D8 P+pMW5FonS +BFQY4yA1H UqQH7tBygK ESDR+8Vd/6 NvvvgwIH55 4SqTi3P/7z f9Z8Gl4iWD m/A5ziUohM 4S8jMX98TP EqABAUgCKp AHykAd6ABD YAasgC1wBG 7AG/iDEBAJ VgMWSASpgA +yQB7YBApB MdgJ9oBqUA caQTNoBcdB JzgFzoNL4B q4AW6D+2AU TIBnYBa8Bg sQBGEhMkSB 5CEVSBPSh8 wgBmQPuUG+ UBAUCcVCCR APEkJ50Gao GCqDqqF6qB n6HjoJnYeu QIPQXWgMmo Z+h97BCEyC qbASrAUbww zYCfaBQ+BV cAK8Bs6FC+ AdcCXcAB+F O+Dz8DX4Nj wKP4PnEIAQ ERqiihgiDM QF8UeikHiE j6xHipAKpA FpRbqRPuQm MorMIG9RGB QFRUcZomxR nqhQFAu1Br UeVYKqRh1G daB6UTdRY6 hZ1Ec0Ga2I 1kfboL3QEe gEdBa6EF2B bkK3oy+ib6 Mn0K8xGAwN o42xwnhiIj FJmLWYEsw+ TBvmHGYQM4 6Zw2Kx8lh9 rB3WH8vECr CF2CrsUexZ 7BB2AvsGR8 Sp4Mxw7rgo HA+Xj6vAHc GdwQ3hJnEL eCm8Jt4G74 9n43PwpfhG fDf+On4Cv0 CQJmgT7Agh hCTCJkIloZ VwkfCA8JJI JKoRrYmBRC 5xI7GSeIx4 mThGfEuSIe mRXEjRJCFp B+kQ6RzpLu klmUzWIjuS o8gC8g5yM/ kC+RH5jQRF wkjCS4ItsU GiRqJDYkji uSReUlPSSX K1ZK5kheQJ yeuSM1J4KS 0pFymm1Hqp GqmTUiNSc9 IUaVNpf+lU 6RLpI9JXpK dksDJaMm4y bJkCmYMyF2 TGKQhFneJC YVE2UxopFy kTVAxVm+pF TaIWU7+jDl BnZWVkl8mG yWbL1sielh 2lITQtmhct hVZKO04bpr 1borTEaQln yfYlrUuGls zLLZVzlOPI Fcm1yd2Wey dPl3eTT5bf Jd8p/1ABpa CnEKiQpbBf 4aLCzFLqUt ulrKVFS48v vacIK+opBi muVTyo2K84 p6Ss5KGUrl SldEFpRpmm 7KicpFyufE Z5WoWiYq/C VSlXOavylC 5Ld6Kn0Cvp vfRZVUVVT1 Whar3qgOqC mrZaqFq+Wp vaQ3WCOkM9 Xr1cvUd9Vk NFw08jT6NF 454mXpOhma i5V7NPc15L Wytca6tWp9 aUtpy2l3au dov2Ax2yjo POGp0GnVu6 GF2GbrLuPt 0berCehV6i Xo3edX1Y31 Kfq79Pf9AA bWBtwDNoMB gxJBk6GWYa thiOGdGMfI 3yjTqNnhtr GEcZ7zLuM/ 5oYmGSYtJo ct9UxtTbNN +02/R3Mz0z llmN2S1zsr m7+QbzLvMX y/SXcZbtX3 bHgmLhZ7HV osfig6WVJd +y1XLaSsMq 1qrWaoRBZQ QwShiXrdHW ztYbrE9Zv7 WxtBHYHLf5 zdbQNtn2iO 3Ucu3lnOWN y8ft1OyYdv V2o/Z0+1j7 A/ajDqoOTI cGh8eO6o5s xybHSSddpy Sno07PnU2c +c7tzvMuNi 7rXM65Iq4e rkWuA24ybq Fu1W6P3NXc E9xb3Gc9LD zWepzzRHv6 eO7yHPFS8m J5NXvNelt5 r/Pu9SH5BP tU+zz21fPl +3b7wX7efr v9HqzQXMFb 0ekP/L38d/ s/DNAOWBPw YyAmMCCwJv BJkGlQXlBf MCU4JvhI8O sQ55DSkPuh OqHC0J4wyb DosOaw+XDX 8LLw0QjjiH UR1yIVIrmR XVHYqLCopq i5lW4r96yc iLaILoweXq W9KnvVldUK q1NWn46RjG HGnIhFx4bH Hol9z/RnNj Dn4rziauNm WS6svaxnbE d2OXuaY8cp 40zG28WXxU 8l2CXsTphO dEisSJzhun CruS+SPJPq kuaT/ZMPJX 9KCU9pS8Wl xqae5Mnwkn m9acpp2WmD 6frphemja2 zW7Fkzy/fh N2VAGasyug RU0c9Uv1BH uEU4lmmfWZ P5Jiss60S2 dDYvuz9HL2 d7zmSue+63 a1FrWWt78l TzNuWNrXNa V78eWh+3vm eD+oaCDRMb PTYe3kTYlL zpp3yT/LL8 V5vDN3cXKB VsLBjf4rGl pVCikF84st V2a9021Dbu toHt5turtn 8sYhddLTYp rih+X8Iquf qN6TeV33za Eb9joNSydP 9OzE7ezuFd DrsOl0mX5Z aN7/bb3VFO Ly8qf7UnZs +VimUVdXsJ e4V7Ryt9K7 uqNKp2Vr2v Tqy+XeNc01 arWLu9dn4f e9/Qfsf9rX VKdcV17w5w D9yp96jvaN BqqDiIOZh5 8EljWGPft4 xvm5sUmoqb PhziHRo9HH S4t9mqufmI 4pHSFrhF2D J9NProje9c v+tqNWytb6 O1FR8Dx4TH nn4f+/3wcZ /jPScYJ1p/ 0Pyhtp3SXt QBdeR0zHYm do52RXYNnv Q+2dNt293+ o9GPh06pnq o5LXu69Azh TMGZT2dzz8 6dSz83cz7h /HhPTM/9Cx EXbvUG9g5c 9Ll4+ZL7pQ t9Tn1nL9td PnXF5srJq4 yrndcsr3X0 W/S3/2TxU/ uA5UDHdavr XTesb3QPLh 88M+QwdP6m 681Lt7xuXb u94vbgcOjw nZHokdE77D tTd1PuvriX eW/h/sYH6A dFD6UeVjxS fNTws+7Pba OWo6fHXMf6 Hwc/vj/OGn /2S8Yv7ycK npCfVEyqTD ZPmU2dmnaf vvF05dOJZ+ nPFmYKf5X+ tfa5zvMffn P8rX82Ynbi Bf/Fp99LXs q/PPRq2aue uYC5R69TXy /MF72Rf3P4 LeNt37vwd5 MLWe+x7ys/ 6H7o/ujz8c Gn1E+f/gUD mPP8usTo0w AAAAlwSFlz AAAOxAAADs QBlSsOGwAA AKpJREFUOE 9j+P//P0UY zmA09bYH4v 9E4noMAzis A7ZgUYgVM5 v7fEQxACgo j66ICBwPNw Bo+2QsCvBi div/K2ADgB x+kJPQFRCJ 7Rk4rQOTsE gQhblsApcy sJj7PsImSS wGeQGrBLEY bIBzZtW0kg lziknFcANc s6vDQLRuRJ YPOg0MaUF0 jKwGbABUoS tUAToNT2xI GCwHN4ASDD ONbIzuNJIx VkHi8X8GAI AQEkmTSFVL AAAAAElFTk SuQmCC</a: ImageSourc e><a:Image Stream i:n il="true"/ ><a:Name>D evice</a:N ame><a:Par entId>GE.D S</a:Paren tId><a:Rep resentatio n>Parallel Lines</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes><a :Attribute ><a:IsExte nsion>fals e</a:IsExt ension><a: AttributeV alues xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. Interfaces "><b:Value >No</b:Val ue></a:Att ributeValu es><a:Disp layName>So urce Authe nticated</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>authent icatesSour ce</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>N o</b:Value ></a:Attri buteValues ><a:Displa yName>Dest ination Au thenticate d</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Static< /a:Mode><a :Name>auth enticatesD estination </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>No< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Provid es Confide ntiality</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>provide sConfident iality</a: Name><a:Ty pe>List</a :Type></a: Attribute> <a:Attribu te><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut eValues xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.Interfac es"><b:Val ue>No</b:V alue></a:A ttributeVa lues><a:Di splayName> Provides I ntegrity</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>provide sIntegrity </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute></a:At tributes>< a:Availabl eToBaseMod els xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Ex ternalStor age.OM"/>< a:Behavior i:nil="tr ue"/><a:De scription> | |
82 | A re presentati on of an H TTP data f low. | |
83 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.HTTP< /a:Id><a:I mageLocati on>Before label</a:I mageLocati on><a:Imag eSource>iV BORw0KGgoA AAANSUhEUg AAABAAAAAQ CAYAAAAf8/ 9hAAAABGdB TUEAALGOfP tRkwAAACBj SFJNAACHDw AAjA8AAP1S AACBQAAAfX kAAOmLAAA8 5QAAGcxzPI V3AAAKOWlD Q1BQaG90b3 Nob3AgSUND IHByb2ZpbG UAAEjHnZZ3 VFTXFofPvX d6oc0wAlKG 3rvAANJ7k1 5FYZgZYCgD DjM0sSGiAh FFRJoiSFDE gNFQJFZEsR AUVLAHJAgo MRhFVCxvRt aLrqy89/Ly ++Osb+2z97 n77L3PWhcA kqcvl5cGSw GQyhPwgzyc 6RGRUXTsAI ABHmCAKQBM Vka6X7B7CB DJy82FniFy Al8EAfB6WL wCcNPQM4BO B/+fpFnpfI HomAARm7M5 GSwRF4g4JU uQLrbPipga lyxmGCVmvi hBEcuJOWGR DT77LLKjmN mpPLaIxTmn s1PZYu4V8b ZMIUfEiK+I CzO5nCwR3x KxRoowlSvi N+LYVA4zAw AUSWwXcFiJ IjYRMYkfEu Qi4uUA4EgJ X3HcVyzgZA vEl3JJS8/h cxMSBXQdli 7d1NqaQffk ZKVwBALDAC Yrmcln013S UtOZvBwAFu /8WTLi2tJF RbY0tba0ND QzMv2qUP91 829K3NtFeh n4uWcQrf+L 7a/80hoAYM yJarPziy2u CoDOLQDI3f ti0zgAgKSo bx3Xv7oPTT wviQJBuo2x cVZWlhGXwz ISF/QP/U+H v6GvvmckPu 6P8tBdOfFM YYqALq4bKy 0lTcinZ6Qz WRy64Z+H+B 8H/nUeBkGc eA6fwxNFhI mmjMtLELWb x+YKuGk8Op f3n5r4D8P+ pMW5FonS+B FQY4yA1HUq QH7tBygKES DR+8Vd/6Nv vvgwIH554S qTi3P/7zf9 Z8Gl4iWDm/ A5ziUohM4S 8jMX98TPEq ABAUgCKpAH ykAd6ABDYA asgC1wBG7A G/iDEBAJVg MWSASpgA+y QB7YBApBMd gJ9oBqUAca QTNoBcdBJz gFzoNL4Bq4 AW6D+2AUTI BnYBa8BgsQ BGEhMkSB5C EVSBPSh8wg BmQPuUG+UB AUCcVCCRAP EkJ50GaoGC qDqqF6qBn6 HjoJnYeuQI PQXWgMmoZ+ h97BCEyCqb ASrAUbwwzY CfaBQ+BVcA K8Bs6FC+Ad cCXcAB+FO+ Dz8DX4NjwK P4PnEIAQER qiihgiDMQF 8UeikHiEj6 xHipAKpAFp RbqRPuQmMo rMIG9RGBQF RUcZomxRnq hQFAu1BrUe VYKqRh1Gda B6UTdRY6hZ 1Ec0Ga2I1k fboL3QEegE dBa6EF2Bbk K3oy+ib6Mn 0K8xGAwNo4 2xwnhiIjFJ mLWYEsw+TB vmHGYQM46Z w2Kx8lh9rB 3WH8vECrCF 2CrsUexZ7B B2AvsGR8Sp 4Mxw7rgoHA +Xj6vAHcGd wQ3hJnELeC m8Jt4G749n 43PwpfhGfD f+On4Cv0CQ JmgT7AghhC TCJkIloZVw kfCA8JJIJK oRrYmBRC5x I7GSeIx4mT hGfEuSIemR XEjRJCFpB+ kQ6RzpLukl mUzWIjuSo8 gC8g5yM/kC +RH5jQRFwk jCS4ItsUGi RqJDYkjiuS ReUlPSSXK1 ZK5kheQJye uSM1J4KS0p Fymm1HqpGq mTUiNSc9IU aVNpf+lU6R LpI9JXpKdk sDJaMm4ybJ kCmYMyF2TG KQhFneJCYV E2UxopFykT VAxVm+pFTa IWU7+jDlBn ZWVkl8mGyW bL1sielh2l ITQtmhcthV ZKO04bpr1b orTEaQlnyf YlrUuGlszL LZVzlOPIFc m1yd2WeydP l3eTT5bfJd 8p/1ABpaCn EKiQpbBf4a LCzFLqUtul rKVFS48vva cIK+opBimu VTyo2K84p6 Ss5KGUrlSl dEFpRpmm7K icpFyufEZ5 WoWiYq/CVS lXOavylC5L d6Kn0Cvpvf RZVUVVT1Wh ar3qgOqCmr ZaqFq+Wpva Q3WCOkM9Xr 1cvUd9VkNF w08jT6NF45 4mXpOhmai5 V7NPc15LWy tca6tWp9aU tpy2l3audo v2Ax2yjoPO Gp0GnVu6GF 2GbrLuPt0b erCehV6iXo 3edX1Y31Kf q79Pf9AAbW BtwDNoMBgx JBk6GWYath iOGdGMfI3y jTqNnhtrGE cZ7zLuM/5o YmGSYtJoct 9UxtTbNN+0 2/R3Mz0zll mN2S1zsrm7 +QbzLvMXy/ SXcZbtX3bH gmLhZ7HVos fig6WVJd+y 1XLaSsMq1q rWaoRBZQQw ShiXrdHWzt YbrE9Zv7Wx tBHYHLf5zd bQNtn2iO3U cu3lnOWNy8 ft1OyYdvV2 o/Z0+1j7A/ ajDqoOTIcG h8eO6o5sxy bHSSddpySn o07PnU2c+c 7tzvMuNi7r XM65Iq4erk WuA24ybqFu 1W6P3NXcE9 xb3Gc9LDzW epzzRHv6eO 7yHPFS8mJ5 NXvNelt5r/ Pu9SH5BPtU +zz21fPl+3 b7wX7efrv9 HqzQXMFb0e kP/L38d/s/ DNAOWBPwYy AmMCCwJvBJ kGlQXlBfMC U4JvhI8OsQ 55DSkPuhOq HC0J4wybDo sOaw+XDX8L Lw0QjjiHUR 1yIVIrmRXV HYqLCopqi5 lW4r96yciL aILoweXqW9 KnvVldUKq1 NWn46RjGHG nIhFx4bHHo l9z/RnNjDn 4rziauNmWS 6svaxnbEd2 OXuaY8cp40 zG28WXxU8l 2CXsTphOdE isSJzhunCr uS+SPJPqku aT/ZMPJX9K CU9pS8Wlxq ae5Mnwknm9 acpp2WmD6f rphemja2zW 7Fkzy/fhN2 VAGasyugRU 0c9Uv1BHuE U4lmmfWZP5 Jiss60S2dD Yvuz9HL2d7 zmSue+63a1 FrWWt78lTz NuWNrXNaV7 8eWh+3vmeD +oaCDRMbPT Ye3kTYlLzp p3yT/LL8V5 vDN3cXKBVs LBjf4rGlpV CikF84stV2 a9021Dbuto Ht5turtn8s YhddLTYpri h+X8IqufqN 6TeV33zaEb 9joNSydP9O zE7ezuFdDr sOl0mX5ZaN 7/bb3VFOLy 8qf7UnZs+V imUVdXsJe4 V7Ryt9K7uq NKp2Vr2vTq y+XeNc01ar WLu9dn4fe9 /Qfsf9rXVK dcV17w5wD9 yp96jvaNBq qDiIOZh58E ljWGPft4xv m5sUmoqbPh ziHRo9HHS4 t9mqufmI4p HSFrhF2DJ9 NProje9cv+ tqNWytb6O1 FR8Dx4THnn 4f+/3wcZ/j PScYJ1p/0P yhtp3SXtQB deR0zHYmdo 52RXYNnvQ+ 2dNt293+o9 GPh06pnqo5 LXu69AzhTM GZT2dzz86d Sz83cz7h/H hPTM/9CxEX bvUG9g5c9L l4+ZL7pQt9 Tn1nL9tdPn XF5srJq4yr ndcsr3X0W/ S3/2TxU/uA 5UDHdavrXT esb3QPLh88 M+QwdP6m68 1Lt7xuXbu9 4vbgcOjwnZ HokdE77DtT d1PuvriXeW /h/sYH6AdF D6UeVjxSfN Tws+7PbaOW o6fHXMf6Hw c/vj/OGn/2 S8Yv7ycKnp CfVEyqTDZP mU2dmnafvv F05dOJZ+nP FmYKf5X+tf a5zvMffnP8 rX82YnbiBf /Fp99LXsq/ PPRq2aueuY C5R69TXy/M F72Rf3P4Le Nt37vwd5ML We+x7ys/6H 7o/ujz8cGn 1E+f/gUDmP P8usTo0wAA AAlwSFlzAA AOxAAADsQB lSsOGwAAAD hJREFUOE9j YDT1/k8JHj WAWgaAAIwm BWA1AEQTw4 bRcANgAF0h NjYMgPhkuw CGqWMAJXjU AO//APzi2/ y5tNUIAAAA AElFTkSuQm CC</a:Imag eSource><a :ImageStre am i:nil=" true"/><a: Name>HTTP< /a:Name><a :ParentId> GE.DF</a:P arentId><a :Represent ation>Line </a:Repres entation>< a:Shape i: nil="true" /></a:Elem entType><a :ElementTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut es><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>Yes< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>Destin ation Auth enticated< /a:Display Name><a:In heritance> Virtual</a :Inheritan ce><a:Mode >Static</a :Mode><a:N ame>authen ticatesDes tination</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Yes</ b:Value></ a:Attribut eValues><a :DisplayNa me>Provide s Confiden tiality</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>S tatic</a:M ode><a:Nam e>provides Confidenti ality</a:N ame><a:Typ e>List</a: Type></a:A ttribute>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>Yes</b:V alue></a:A ttributeVa lues><a:Di splayName> Provides I ntegrity</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>provide sIntegrity </a:Name>< a:Type>Lis t</a:Type> </a:Attrib ute></a:At tributes>< a:Availabl eToBaseMod els xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Ex ternalStor age.OM"/>< a:Behavior i:nil="tr ue"/><a:De scription> | |
84 | A re presentati on of an H TTPS data flow. | |
85 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.HTTPS </a:Id><a: ImageLocat ion>Before label</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA P9JREFUOE+ 10s1mQ0EYx vFECCGr3Ec I0dBVKeFw6 B1kFULpKqv SVSkl5A5yE 9lmFbINJWS VVbZZhRBKm f6f8U5NT9p ptbL4OWfmv O8zH06pfJG 7/zh7wAzX6 GCIFT7VpAL WqDrnSoHGe LbvXirgMWp 8wAKZjSfwd amApyhgbnN vuEQdW82lA pZRwBVebX5 kc/4oqQDxW 7aGNkZo2ri PkwDd8tTet e1aCCji21h 1xYAXNHAP3 8yzC61WiZq bOOAjYIM9d K67qDDDEar ZQf/FErpMv 2gI0HZaGBS aw8V9KwRIL 2rO8WOzhAA V1635xsYnx V+Jd6CLusW vmyUO+IPcv QN8C4wQAsH zwgAAAABJR U5ErkJggg= =</a:Image Source><a: ImageStrea m i:nil="t rue"/><a:N ame>HTTPS< /a:Name><a :ParentId> GE.DF</a:P arentId><a :Represent ation>Line </a:Repres entation>< a:Shape i: nil="true" /></a:Elem entType><a :ElementTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut es/><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
86 | A re presentati on of an B inary data flow. | |
87 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.Binar y</a:Id><a :ImageLoca tion>Befor e label</a :ImageLoca tion><a:Im ageSource> iVBORw0KGg oAAAANSUhE UgAAABAAAA AQCAYAAAAf 8/9hAAAABG dBTUEAALGO fPtRkwAAAC BjSFJNAACH DwAAjA8AAP 1SAACBQAAA fXkAAOmLAA A85QAAGcxz PIV3AAAKOW lDQ1BQaG90 b3Nob3AgSU NDIHByb2Zp bGUAAEjHnZ Z3VFTXFofP vXd6oc0wAl KG3rvAANJ7 k15FYZgZYC gDDjM0sSGi AhFFRJoiSF DEgNFQJFZE sRAUVLAHJA goMRhFVCxv RtaLrqy89/ Ly++Osb+2z 97n77L3PWh cAkqcvl5cG SwGQyhPwgz yc6RGRUXTs AIABHmCAKQ BMVka6X7B7 CBDJy82Fni FyAl8EAfB6 WLwCcNPQM4 BOB/+fpFnp fIHomAARm7 M5GSwRF4g4 JUuQLrbPip galyxmGCVm vihBEcuJOW GRDT77LLKj mNmpPLaIxT mns1PZYu4V 8bZMIUfEiK +ICzO5nCwR 3xKxRoowlS viN+LYVA4z AwAUSWwXcF iJIjYRMYkf EuQi4uUA4E gJX3HcVyzg ZAvEl3JJS8 /hcxMSBXQd li7d1NqaQf fkZKVwBALD ACYrmcln01 3SUtOZvBwA Fu/8WTLi2t JFRbY0tba0 NDQzMv2qUP 91829K3NtF ehn4uWcQrf +L7a/80hoA YMyJarPziy 2uCoDOLQDI 3fti0zgAgK Sobx3Xv7oP TTwviQJBuo 2xcVZWlhGX wzISF/QP/U +Hv6Gvvmck Pu6P8tBdOf FMYYqALq4b Ky0lTcinZ6 QzWRy64Z+H +B8H/nUeBk GceA6fwxNF hImmjMtLEL Wbx+YKuGk8 Opf3n5r4D8 P+pMW5FonS +BFQY4yA1H UqQH7tBygK ESDR+8Vd/6 NvvvgwIH55 4SqTi3P/7z f9Z8Gl4iWD m/A5ziUohM 4S8jMX98TP EqABAUgCKp AHykAd6ABD YAasgC1wBG 7AG/iDEBAJ VgMWSASpgA +yQB7YBApB MdgJ9oBqUA caQTNoBcdB JzgFzoNL4B q4AW6D+2AU TIBnYBa8Bg sQBGEhMkSB 5CEVSBPSh8 wgBmQPuUG+ UBAUCcVCCR APEkJ50Gao GCqDqqF6qB n6HjoJnYeu QIPQXWgMmo Z+h97BCEyC qbASrAUbww zYCfaBQ+BV cAK8Bs6FC+ AdcCXcAB+F O+Dz8DX4Nj wKP4PnEIAQ ERqiihgiDM QF8UeikHiE j6xHipAKpA FpRbqRPuQm MorMIG9RGB QFRUcZomxR nqhQFAu1Br UeVYKqRh1G daB6UTdRY6 hZ1Ec0Ga2I 1kfboL3QEe gEdBa6EF2B bkK3oy+ib6 Mn0K8xGAwN o42xwnhiIj FJmLWYEsw+ TBvmHGYQM4 6Zw2Kx8lh9 rB3WH8vECr CF2CrsUexZ 7BB2AvsGR8 Sp4Mxw7rgo HA+Xj6vAHc GdwQ3hJnEL eCm8Jt4G74 9n43PwpfhG fDf+On4Cv0 CQJmgT7Agh hCTCJkIloZ VwkfCA8JJI JKoRrYmBRC 5xI7GSeIx4 mThGfEuSIe mRXEjRJCFp B+kQ6RzpLu klmUzWIjuS o8gC8g5yM/ kC+RH5jQRF wkjCS4ItsU GiRqJDYkji uSReUlPSSX K1ZK5kheQJ yeuSM1J4KS 0pFymm1Hqp GqmTUiNSc9 IUaVNpf+lU 6RLpI9JXpK dksDJaMm4y bJkCmYMyF2 TGKQhFneJC YVE2UxopFy kTVAxVm+pF TaIWU7+jDl BnZWVkl8mG yWbL1sielh 2lITQtmhct hVZKO04bpr 1borTEaQln yfYlrUuGls zLLZVzlOPI Fcm1yd2Wey dPl3eTT5bf Jd8p/1ABpa CnEKiQpbBf 4aLCzFLqUt ulrKVFS48v vacIK+opBi muVTyo2K84 p6Ss5KGUrl SldEFpRpmm 7KicpFyufE Z5WoWiYq/C VSlXOavylC 5Ld6Kn0Cvp vfRZVUVVT1 Whar3qgOqC mrZaqFq+Wp vaQ3WCOkM9 Xr1cvUd9Vk NFw08jT6NF 454mXpOhma i5V7NPc15L Wytca6tWp9 aUtpy2l3au dov2Ax2yjo POGp0GnVu6 GF2GbrLuPt 0berCehV6i Xo3edX1Y31 Kfq79Pf9AA bWBtwDNoMB gxJBk6GWYa thiOGdGMfI 3yjTqNnhtr GEcZ7zLuM/ 5oYmGSYtJo ct9UxtTbNN +02/R3Mz0z llmN2S1zsr m7+QbzLvMX y/SXcZbtX3 bHgmLhZ7HV osfig6WVJd +y1XLaSsMq 1qrWaoRBZQ QwShiXrdHW ztYbrE9Zv7 WxtBHYHLf5 zdbQNtn2iO 3Ucu3lnOWN y8ft1OyYdv V2o/Z0+1j7 A/ajDqoOTI cGh8eO6o5s xybHSSddpy Sno07PnU2c +c7tzvMuNi 7rXM65Iq4e rkWuA24ybq Fu1W6P3NXc E9xb3Gc9LD zWepzzRHv6 eO7yHPFS8m J5NXvNelt5 r/Pu9SH5BP tU+zz21fPl +3b7wX7efr v9HqzQXMFb 0ekP/L38d/ s/DNAOWBPw YyAmMCCwJv BJkGlQXlBf MCU4JvhI8O sQ55DSkPuh OqHC0J4wyb DosOaw+XDX 8LLw0QjjiH UR1yIVIrmR XVHYqLCopq i5lW4r96yc iLaILoweXq W9KnvVldUK q1NWn46RjG HGnIhFx4bH Hol9z/RnNj Dn4rziauNm WS6svaxnbE d2OXuaY8cp 40zG28WXxU 8l2CXsTphO dEisSJzhun CruS+SPJPq kuaT/ZMPJX 9KCU9pS8Wl xqae5Mnwkn m9acpp2WmD 6frphemja2 zW7Fkzy/fh N2VAGasyug RU0c9Uv1BH uEU4lmmfWZ P5Jiss60S2 dDYvuz9HL2 d7zmSue+63 a1FrWWt78l TzNuWNrXNa V78eWh+3vm eD+oaCDRMb PTYe3kTYlL zpp3yT/LL8 V5vDN3cXKB VsLBjf4rGl pVCikF84st V2a9021Dbu toHt5turtn 8sYhddLTYp rih+X8Iquf qN6TeV33za Eb9joNSydP 9OzE7ezuFd DrsOl0mX5Z aN7/bb3VFO Ly8qf7UnZs +VimUVdXsJ e4V7Ryt9K7 uqNKp2Vr2v Tqy+XeNc01 arWLu9dn4f e9/Qfsf9rX VKdcV17w5w D9yp96jvaN BqqDiIOZh5 8EljWGPft4 xvm5sUmoqb PhziHRo9HH S4t9mqufmI 4pHSFrhF2D J9NProje9c v+tqNWytb6 O1FR8Dx4TH nn4f+/3wcZ /jPScYJ1p/ 0Pyhtp3SXt QBdeR0zHYm do52RXYNnv Q+2dNt293+ o9GPh06pnq o5LXu69Azh TMGZT2dzz8 6dSz83cz7h /HhPTM/9Cx EXbvUG9g5c 9Ll4+ZL7pQ t9Tn1nL9td PnXF5srJq4 yrndcsr3X0 W/S3/2TxU/ uA5UDHdavr XTesb3QPLh 88M+QwdP6m 681Lt7xuXb u94vbgcOjw nZHokdE77D tTd1PuvriX eW/h/sYH6A dFD6UeVjxS fNTws+7Pba OWo6fHXMf6 Hwc/vj/OGn /2S8Yv7ycK npCfVEyqTD ZPmU2dmnaf vvF05dOJZ+ nPFmYKf5X+ tfa5zvMffn P8rX82Ynbi Bf/Fp99LXs q/PPRq2aue uYC5R69TXy /MF72Rf3P4 LeNt37vwd5 MLWe+x7ys/ 6H7o/ujz8c Gn1E+f/gUD mPP8usTo0w AAAAlwSFlz AAAOxAAADs QBlSsOGwAA AGNJREFUOE 9jYDT1/k8J hhnwGYjnAP EHKB8fBqkB qQXpgRswGY hB7BYoHx8G qQGpBelBcc FMIH4L5ePD IDUgtSguIB tT3wAgYMCH 0dVT3wBSMf UNQHcyOkZX PxwNIBVTaI D3fwAn5sGw mvgmbgAAAA BJRU5ErkJg gg==</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Bin ary</a:Nam e><a:Paren tId>GE.DF< /a:ParentI d><a:Repre sentation> Line</a:Re presentati on><a:Shap e i:nil="t rue"/></a: ElementTyp e><a:Eleme ntType><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibutes><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> Yes</b:Val ue></a:Att ributeValu es><a:Disp layName>So urce Authe nticated</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Static</a: Mode><a:Na me>authent icatesSour ce</a:Name ><a:Type>L ist</a:Typ e></a:Attr ibute><a:A ttribute>< a:IsExtens ion>false< /a:IsExten sion><a:At tributeVal ues xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.In terfaces"> <b:Value>Y es</b:Valu e></a:Attr ibuteValue s><a:Displ ayName>Des tination A uthenticat ed</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Static </a:Mode>< a:Name>aut henticates Destinatio n</a:Name> <a:Type>Li st</a:Type ></a:Attri bute><a:At tribute><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributeValu es xmlns:b ="http://s chemas.dat acontract. org/2004/0 7/ThreatMo deling.Int erfaces">< b:Value>Ye s</b:Value ></a:Attri buteValues ><a:Displa yName>Prov ides Confi dentiality </a:Displa yName><a:I nheritance >Virtual</ a:Inherita nce><a:Mod e>Static</ a:Mode><a: Name>provi desConfide ntiality</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>Yes</ b:Value></ a:Attribut eValues><a :DisplayNa me>Provide s Integrit y</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Static< /a:Mode><a :Name>prov idesIntegr ity</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute></a :Attribute s><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
88 | A re presentati on of an I Psec data flow. | |
89 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.IPsec </a:Id><a: ImageLocat ion>Before label</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA PtJREFUOE+ l0kFnA0EYx vGtUErIqde eeiqlRG6lp 5xCv0S+wVK W0lPJKacSS k79BqWUEHI KJZR8j5xKC WH6f9a8a2y nnWUPv8g7m ecxO5vMOdd K+XE0GP1li CU+MMUlqt9 TBRfYwwU0F yj3pAoeYMF HXOPdz2MkC +5hBTd+rYM 1vnCWKujDC lY4htbv/Fq RKhA7smyg8 NbP81iBbvn Wf9exv2EFd Xms4Ao7TGD hBeY4+Fl0i m5YcI4e9Iq eYBv1CCfQn lPof6G70WW WWSvI8Ylnh GG7uKiwQF5 g4Tf8G5awQ Jv1bhV+9fO vQF39BLqoG RqFpSpoI7r YnMt+APCSd 3DankzjAAA AAElFTkSuQ mCC</a:Ima geSource>< a:ImageStr eam i:nil= "true"/><a :Name>IPse c</a:Name> <a:ParentI d>GE.DF</a :ParentId> <a:Represe ntation>Li ne</a:Repr esentation ><a:Shape i:nil="tru e"/></a:El ementType> <a:Element Type><a:Is Extension> false</a:I sExtension ><a:Attrib utes/><a:A vailableTo BaseModels xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Exter nalStorage .OM"/><a:B ehavior i: nil="true" /><a:Descr iption> | |
90 | A re presentati on of a na med pipe d ata flow. | |
91 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.Named Pipe</a:Id ><a:ImageL ocation>Be fore label </a:ImageL ocation><a :ImageSour ce>iVBORw0 KGgoAAAANS UhEUgAAABA AAAAQCAYAA AAf8/9hAAA ABGdBTUEAA LGOfPtRkwA AACBjSFJNA ACHDwAAjA8 AAP1SAACBQ AAAfXkAAOm LAAA85QAAG cxzPIV3AAA KOWlDQ1BQa G90b3Nob3A gSUNDIHByb 2ZpbGUAAEj HnZZ3VFTXF ofPvXd6oc0 wAlKG3rvAA NJ7k15FYZg ZYCgDDjM0s SGiAhFFRJo iSFDEgNFQJ FZEsRAUVLA HJAgoMRhFV CxvRtaLrqy 89/Ly++Osb +2z97n77L3 PWhcAkqcvl 5cGSwGQyhP wgzyc6RGRU XTsAIABHmC AKQBMVka6X 7B7CBDJy82 FniFyAl8EA fB6WLwCcNP QM4BOB/+fp FnpfIHomAA Rm7M5GSwRF 4g4JUuQLrb PipgalyxmG CVmvihBEcu JOWGRDT77L LKjmNmpPLa IxTmns1PZY u4V8bZMIUf EiK+ICzO5n CwR3xKxRoo wlSviN+LYV A4zAwAUSWw XcFiJIjYRM YkfEuQi4uU A4EgJX3HcV yzgZAvEl3J JS8/hcxMSB XQdli7d1Nq aQffkZKVwB ALDACYrmcl n013SUtOZv BwAFu/8WTL i2tJFRbY0t ba0NDQzMv2 qUP91829K3 NtFehn4uWc Qrf+L7a/80 hoAYMyJarP ziy2uCoDOL QDI3fti0zg AgKSobx3Xv 7oPTTwviQJ Buo2xcVZWl hGXwzISF/Q P/U+Hv6Gvv mckPu6P8tB dOfFMYYqAL q4bKy0lTci nZ6QzWRy64 Z+H+B8H/nU eBkGceA6fw xNFhImmjMt LELWbx+YKu Gk8Opf3n5r 4D8P+pMW5F onS+BFQY4y A1HUqQH7tB ygKESDR+8V d/6NvvvgwI H554SqTi3P /7zf9Z8Gl4 iWDm/A5ziU ohM4S8jMX9 8TPEqABAUg CKpAHykAd6 ABDYAasgC1 wBG7AG/iDE BAJVgMWSAS pgA+yQB7YB ApBMdgJ9oB qUAcaQTNoB cdBJzgFzoN L4Bq4AW6D+ 2AUTIBnYBa 8BgsQBGEhM kSB5CEVSBP Sh8wgBmQPu UG+UBAUCcV CCRAPEkJ50 GaoGCqDqqF 6qBn6HjoJn YeuQIPQXWg MmoZ+h97BC EyCqbASrAU bwwzYCfaBQ +BVcAK8Bs6 FC+AdcCXcA B+FO+Dz8DX 4NjwKP4PnE IAQERqiihg iDMQF8Ueik HiEj6xHipA KpAFpRbqRP uQmMorMIG9 RGBQFRUcZo mxRnqhQFAu 1BrUeVYKqR h1GdaB6UTd RY6hZ1Ec0G a2I1kfboL3 QEegEdBa6E F2BbkK3oy+ ib6Mn0K8xG AwNo42xwnh iIjFJmLWYE sw+TBvmHGY QM46Zw2Kx8 lh9rB3WH8v ECrCF2CrsU exZ7BB2Avs GR8Sp4Mxw7 rgoHA+Xj6v AHcGdwQ3hJ nELeCm8Jt4 G749n43Pwp fhGfDf+On4 Cv0CQJmgT7 AghhCTCJkI loZVwkfCA8 JJIJKoRrYm BRC5xI7GSe Ix4mThGfEu SIemRXEjRJ CFpB+kQ6Rz pLuklmUzWI juSo8gC8g5 yM/kC+RH5j QRFwkjCS4I tsUGiRqJDY kjiuSReUlP SSXK1ZK5kh eQJyeuSM1J 4KS0pFymm1 HqpGqmTUiN Sc9IUaVNpf +lU6RLpI9J XpKdksDJaM m4ybJkCmYM yF2TGKQhFn eJCYVE2Uxo pFykTVAxVm +pFTaIWU7+ jDlBnZWVkl 8mGyWbL1si elh2lITQtm hcthVZKO04 bpr1borTEa QlnyfYlrUu GlszLLZVzl OPIFcm1yd2 WeydPl3eTT 5bfJd8p/1A BpaCnEKiQp bBf4aLCzFL qUtulrKVFS 48vvacIK+o pBimuVTyo2 K84p6Ss5KG UrlSldEFpR pmm7KicpFy ufEZ5WoWiY q/CVSlXOav ylC5Ld6Kn0 CvpvfRZVUV VT1Whar3qg OqCmrZaqFq +WpvaQ3WCO kM9Xr1cvUd 9VkNFw08jT 6NF454mXpO hmai5V7NPc 15LWytca6t Wp9aUtpy2l 3audov2Ax2 yjoPOGp0Gn Vu6GF2GbrL uPt0berCeh V6iXo3edX1 Y31Kfq79Pf 9AAbWBtwDN oMBgxJBk6G WYathiOGdG MfI3yjTqNn htrGEcZ7zL uM/5oYmGSY tJoct9UxtT bNN+02/R3M z0zllmN2S1 zsrm7+QbzL vMXy/SXcZb tX3bHgmLhZ 7HVosfig6W VJd+y1XLaS sMq1qrWaoR BZQQwShiXr dHWztYbrE9 Zv7WxtBHYH Lf5zdbQNtn 2iO3Ucu3ln OWNy8ft1Oy YdvV2o/Z0+ 1j7A/ajDqo OTIcGh8eO6 o5sxybHSSd dpySno07Pn U2c+c7tzvM uNi7rXM65I q4erkWuA24 ybqFu1W6P3 NXcE9xb3Gc 9LDzWepzzR Hv6eO7yHPF S8mJ5NXvNe lt5r/Pu9SH 5BPtU+zz21 fPl+3b7wX7 efrv9HqzQX MFb0ekP/L3 8d/s/DNAOW BPwYyAmMCC wJvBJkGlQX lBfMCU4Jvh I8OsQ55DSk PuhOqHC0J4 wybDosOaw+ XDX8LLw0Qj jiHUR1yIVI rmRXVHYqLC opqi5lW4r9 6yciLaILow eXqW9KnvVl dUKq1NWn46 RjGHGnIhFx 4bHHol9z/R nNjDn4rzia uNmWS6svax nbEd2OXuaY 8cp40zG28W XxU8l2CXsT phOdEisSJz hunCruS+SP JPqkuaT/ZM PJX9KCU9pS 8Wlxqae5Mn wknm9acpp2 WmD6frphem ja2zW7Fkzy /fhN2VAGas yugRU0c9Uv 1BHuEU4lmm fWZP5Jiss6 0S2dDYvuz9 HL2d7zmSue +63a1FrWWt 78lTzNuWNr XNaV78eWh+ 3vmeD+oaCD RMbPTYe3kT YlLzpp3yT/ LL8V5vDN3c XKBVsLBjf4 rGlpVCikF8 4stV2a9021 DbutoHt5tu rtn8sYhddL TYprih+X8I qufqN6TeV3 3zaEb9joNS ydP9OzE7ez uFdDrsOl0m X5ZaN7/bb3 VFOLy8qf7U nZs+VimUVd XsJe4V7Ryt 9K7uqNKp2V r2vTqy+XeN c01arWLu9d n4fe9/Qfsf 9rXVKdcV17 w5wD9yp96j vaNBqqDiIO Zh58EljWGP ft4xvm5sUm oqbPhziHRo 9HHS4t9mqu fmI4pHSFrh F2DJ9NProj e9cv+tqNWy tb6O1FR8Dx 4THnn4f+/3 wcZ/jPScYJ 1p/0Pyhtp3 SXtQBdeR0z HYmdo52RXY NnvQ+2dNt2 93+o9GPh06 pnqo5LXu69 AzhTMGZT2d zz86dSz83c z7h/HhPTM/ 9CxEXbvUG9 g5c9Ll4+ZL 7pQt9Tn1nL 9tdPnXF5sr Jq4yrndcsr 3X0W/S3/2T xU/uA5UDHd avrXTesb3Q PLh88M+Qwd P6m681Lt7x uXbu94vbgc OjwnZHokdE 77DtTd1Puv riXeW/h/sY H6AdFD6UeV jxSfNTws+7 PbaOWo6fHX Mf6Hwc/vj/ OGn/2S8Yv7 ycKnpCfVEy qTDZPmU2dm nafvvF05dO JZ+nPFmYKf 5X+tfa5zvM ffnP8rX82Y nbiBf/Fp99 LXsq/PPRq2 aueuYC5R69 TXy/MF72Rf 3P4LeNt37v wd5MLWe+x7 ys/6H7o/uj z8cGn1E+f/ gUDmPP8usT o0wAAAAlwS FlzAAAOxAA ADsQBlSsOG wAAAKxJREF UOE9jYDT1r gDin0D8Hwu eD8QgNfxAf BIqhowvgSS /AfFtIJ6JA zsBMS5DwAa AGEuBGMTGh 0EGHANisgz ApploA7BpL oWKwQ2YBsT oGkEYm78zg RgkxwPEM0E MfAZwAvFeI EbXDMPMIAK fASAMMwRdc xQQE2UALrw FiKeBGJQYQ DAQ8eHBYcA 9EIMSAx6CG J+B+BUQnyE RfwBisBdCg PgwVJAUDEw b3vYAyzfmx SXYv1YAAAA ASUVORK5CY II=</a:Ima geSource>< a:ImageStr eam i:nil= "true"/><a :Name>Name d Pipe</a: Name><a:Pa rentId>GE. DF</a:Pare ntId><a:Re presentati on>Line</a :Represent ation><a:S hape i:nil ="true"/>< /a:Element Type><a:El ementType> <a:IsExten sion>false </a:IsExte nsion><a:A ttributes/ ><a:Availa bleToBaseM odels xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. ExternalSt orage.OM"/ ><a:Behavi or i:nil=" true"/><a: Descriptio n> | |
92 | A re presentati on of a SM Bv1 or SMB v2 data fl ow. | |
93 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.SMB</ a:Id><a:Im ageLocatio n>Before l abel</a:Im ageLocatio n><a:Image Source>iVB ORw0KGgoAA AANSUhEUgA AABAAAAAQC AYAAAAf8/9 hAAAABGdBT UEAALGOfPt RkwAAACBjS FJNAACHDwA AjA8AAP1SA ACBQAAAfXk AAOmLAAA85 QAAGcxzPIV 3AAAKOWlDQ 1BQaG90b3N ob3AgSUNDI HByb2ZpbGU AAEjHnZZ3V FTXFofPvXd 6oc0wAlKG3 rvAANJ7k15 FYZgZYCgDD jM0sSGiAhF FRJoiSFDEg NFQJFZEsRA UVLAHJAgoM RhFVCxvRta Lrqy89/Ly+ +Osb+2z97n 77L3PWhcAk qcvl5cGSwG QyhPwgzyc6 RGRUXTsAIA BHmCAKQBMV ka6X7B7CBD Jy82FniFyA l8EAfB6WLw CcNPQM4BOB /+fpFnpfIH omAARm7M5G SwRF4g4JUu QLrbPipgal yxmGCVmvih BEcuJOWGRD T77LLKjmNm pPLaIxTmns 1PZYu4V8bZ MIUfEiK+IC zO5nCwR3xK xRoowlSviN +LYVA4zAwA USWwXcFiJI jYRMYkfEuQ i4uUA4EgJX 3HcVyzgZAv El3JJS8/hc xMSBXQdli7 d1NqaQffkZ KVwBALDACY rmcln013SU tOZvBwAFu/ 8WTLi2tJFR bY0tba0NDQ zMv2qUP918 29K3NtFehn 4uWcQrf+L7 a/80hoAYMy JarPziy2uC oDOLQDI3ft i0zgAgKSob x3Xv7oPTTw viQJBuo2xc VZWlhGXwzI SF/QP/U+Hv 6GvvmckPu6 P8tBdOfFMY YqALq4bKy0 lTcinZ6QzW Ry64Z+H+B8 H/nUeBkGce A6fwxNFhIm mjMtLELWbx +YKuGk8Opf 3n5r4D8P+p MW5FonS+BF QY4yA1HUqQ H7tBygKESD R+8Vd/6Nvv vgwIH554Sq Ti3P/7zf9Z 8Gl4iWDm/A 5ziUohM4S8 jMX98TPEqA BAUgCKpAHy kAd6ABDYAa sgC1wBG7AG /iDEBAJVgM WSASpgA+yQ B7YBApBMdg J9oBqUAcaQ TNoBcdBJzg FzoNL4Bq4A W6D+2AUTIB nYBa8BgsQB GEhMkSB5CE VSBPSh8wgB mQPuUG+UBA UCcVCCRAPE kJ50GaoGCq DqqF6qBn6H joJnYeuQIP QXWgMmoZ+h 97BCEyCqbA SrAUbwwzYC faBQ+BVcAK 8Bs6FC+Adc CXcAB+FO+D z8DX4NjwKP 4PnEIAQERq iihgiDMQF8 UeikHiEj6x HipAKpAFpR bqRPuQmMor MIG9RGBQFR UcZomxRnqh QFAu1BrUeV YKqRh1GdaB 6UTdRY6hZ1 Ec0Ga2I1kf boL3QEegEd Ba6EF2BbkK 3oy+ib6Mn0 K8xGAwNo42 xwnhiIjFJm LWYEsw+TBv mHGYQM46Zw 2Kx8lh9rB3 WH8vECrCF2 CrsUexZ7BB 2AvsGR8Sp4 Mxw7rgoHA+ Xj6vAHcGdw Q3hJnELeCm 8Jt4G749n4 3PwpfhGfDf +On4Cv0CQJ mgT7AghhCT CJkIloZVwk fCA8JJIJKo RrYmBRC5xI 7GSeIx4mTh GfEuSIemRX EjRJCFpB+k Q6RzpLuklm UzWIjuSo8g C8g5yM/kC+ RH5jQRFwkj CS4ItsUGiR qJDYkjiuSR eUlPSSXK1Z K5kheQJyeu SM1J4KS0pF ymm1HqpGqm TUiNSc9IUa VNpf+lU6RL pI9JXpKdks DJaMm4ybJk CmYMyF2TGK QhFneJCYVE 2UxopFykTV AxVm+pFTaI WU7+jDlBnZ WVkl8mGyWb L1sielh2lI TQtmhcthVZ KO04bpr1bo rTEaQlnyfY lrUuGlszLL ZVzlOPIFcm 1yd2WeydPl 3eTT5bfJd8 p/1ABpaCnE KiQpbBf4aL CzFLqUtulr KVFS48vvac IK+opBimuV Tyo2K84p6S s5KGUrlSld EFpRpmm7Ki cpFyufEZ5W oWiYq/CVSl XOavylC5Ld 6Kn0CvpvfR ZVUVVT1Wha r3qgOqCmrZ aqFq+WpvaQ 3WCOkM9Xr1 cvUd9VkNFw 08jT6NF454 mXpOhmai5V 7NPc15LWyt ca6tWp9aUt py2l3audov 2Ax2yjoPOG p0GnVu6GF2 GbrLuPt0be rCehV6iXo3 edX1Y31Kfq 79Pf9AAbWB twDNoMBgxJ Bk6GWYathi OGdGMfI3yj TqNnhtrGEc Z7zLuM/5oY mGSYtJoct9 UxtTbNN+02 /R3Mz0zllm N2S1zsrm7+ QbzLvMXy/S XcZbtX3bHg mLhZ7HVosf ig6WVJd+y1 XLaSsMq1qr WaoRBZQQwS hiXrdHWztY brE9Zv7Wxt BHYHLf5zdb QNtn2iO3Uc u3lnOWNy8f t1OyYdvV2o /Z0+1j7A/a jDqoOTIcGh 8eO6o5sxyb HSSddpySno 07PnU2c+c7 tzvMuNi7rX M65Iq4erkW uA24ybqFu1 W6P3NXcE9x b3Gc9LDzWe pzzRHv6eO7 yHPFS8mJ5N XvNelt5r/P u9SH5BPtU+ zz21fPl+3b 7wX7efrv9H qzQXMFb0ek P/L38d/s/D NAOWBPwYyA mMCCwJvBJk GlQXlBfMCU 4JvhI8OsQ5 5DSkPuhOqH C0J4wybDos Oaw+XDX8LL w0QjjiHUR1 yIVIrmRXVH YqLCopqi5l W4r96yciLa ILoweXqW9K nvVldUKq1N Wn46RjGHGn IhFx4bHHol 9z/RnNjDn4 rziauNmWS6 svaxnbEd2O XuaY8cp40z G28WXxU8l2 CXsTphOdEi sSJzhunCru S+SPJPqkua T/ZMPJX9KC U9pS8Wlxqa e5Mnwknm9a cpp2WmD6fr phemja2zW7 Fkzy/fhN2V AGasyugRU0 c9Uv1BHuEU 4lmmfWZP5J iss60S2dDY vuz9HL2d7z mSue+63a1F rWWt78lTzN uWNrXNaV78 eWh+3vmeD+ oaCDRMbPTY e3kTYlLzpp 3yT/LL8V5v DN3cXKBVsL Bjf4rGlpVC ikF84stV2a 9021DbutoH t5turtn8sY hddLTYprih +X8IqufqN6 TeV33zaEb9 joNSydP9Oz E7ezuFdDrs Ol0mX5ZaN7 /bb3VFOLy8 qf7UnZs+Vi mUVdXsJe4V 7Ryt9K7uqN Kp2Vr2vTqy +XeNc01arW Lu9dn4fe9/ Qfsf9rXVKd cV17w5wD9y p96jvaNBqq DiIOZh58El jWGPft4xvm 5sUmoqbPhz iHRo9HHS4t 9mqufmI4pH SFrhF2DJ9N Proje9cv+t qNWytb6O1F R8Dx4THnn4 f+/3wcZ/jP ScYJ1p/0Py htp3SXtQBd eR0zHYmdo5 2RXYNnvQ+2 dNt293+o9G Ph06pnqo5L Xu69AzhTMG ZT2dzz86dS z83cz7h/Hh PTM/9CxEXb vUG9g5c9Ll 4+ZL7pQt9T n1nL9tdPnX F5srJq4yrn dcsr3X0W/S 3/2TxU/uA5 UDHdavrXTe sb3QPLh88M +QwdP6m681 Lt7xuXbu94 vbgcOjwnZH okdE77DtTd 1PuvriXeW/ h/sYH6AdFD 6UeVjxSfNT ws+7PbaOWo 6fHXMf6Hwc /vj/OGn/2S 8Yv7ycKnpC fVEyqTDZPm U2dmnafvvF 05dOJZ+nPF mYKf5X+tfa 5zvMffnP8r X82YnbiBf/ Fp99LXsq/P PRq2aueuYC 5R69TXy/MF 72Rf3P4LeN t37vwd5MLW e+x7ys/6H7 o/ujz8cGn1 E+f/gUDmPP 8usTo0wAAA AlwSFlzAAA OxAAADsQBl SsOGwAAAEh JREFUOE/Nz LENACAMA8E wFFNk/3kCp otc2VBg6eT uY8ysGyewF 463AbyCAo4 WwCso4GgBv IICjhbAKyj gaAG8ggKOj wK+rAUpwkq HruWEswAAA ABJRU5ErkJ ggg==</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>SM B</a:Name> <a:ParentI d>GE.DF</a :ParentId> <a:Represe ntation>Li ne</a:Repr esentation ><a:Shape i:nil="tru e"/></a:El ementType> <a:Element Type><a:Is Extension> false</a:I sExtension ><a:Attrib utes/><a:A vailableTo BaseModels xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Exter nalStorage .OM"/><a:B ehavior i: nil="true" /><a:Descr iption> | |
94 | A re presentati on of an R PC or Dist ributed CO M (DCOM) d ata flow. | |
95 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.RPC</ a:Id><a:Im ageLocatio n>Before l abel</a:Im ageLocatio n><a:Image Source>iVB ORw0KGgoAA AANSUhEUgA AABAAAAAQC AYAAAAf8/9 hAAAABGdBT UEAALGOfPt RkwAAACBjS FJNAACHDwA AjA8AAP1SA ACBQAAAfXk AAOmLAAA85 QAAGcxzPIV 3AAAKOWlDQ 1BQaG90b3N ob3AgSUNDI HByb2ZpbGU AAEjHnZZ3V FTXFofPvXd 6oc0wAlKG3 rvAANJ7k15 FYZgZYCgDD jM0sSGiAhF FRJoiSFDEg NFQJFZEsRA UVLAHJAgoM RhFVCxvRta Lrqy89/Ly+ +Osb+2z97n 77L3PWhcAk qcvl5cGSwG QyhPwgzyc6 RGRUXTsAIA BHmCAKQBMV ka6X7B7CBD Jy82FniFyA l8EAfB6WLw CcNPQM4BOB /+fpFnpfIH omAARm7M5G SwRF4g4JUu QLrbPipgal yxmGCVmvih BEcuJOWGRD T77LLKjmNm pPLaIxTmns 1PZYu4V8bZ MIUfEiK+IC zO5nCwR3xK xRoowlSviN +LYVA4zAwA USWwXcFiJI jYRMYkfEuQ i4uUA4EgJX 3HcVyzgZAv El3JJS8/hc xMSBXQdli7 d1NqaQffkZ KVwBALDACY rmcln013SU tOZvBwAFu/ 8WTLi2tJFR bY0tba0NDQ zMv2qUP918 29K3NtFehn 4uWcQrf+L7 a/80hoAYMy JarPziy2uC oDOLQDI3ft i0zgAgKSob x3Xv7oPTTw viQJBuo2xc VZWlhGXwzI SF/QP/U+Hv 6GvvmckPu6 P8tBdOfFMY YqALq4bKy0 lTcinZ6QzW Ry64Z+H+B8 H/nUeBkGce A6fwxNFhIm mjMtLELWbx +YKuGk8Opf 3n5r4D8P+p MW5FonS+BF QY4yA1HUqQ H7tBygKESD R+8Vd/6Nvv vgwIH554Sq Ti3P/7zf9Z 8Gl4iWDm/A 5ziUohM4S8 jMX98TPEqA BAUgCKpAHy kAd6ABDYAa sgC1wBG7AG /iDEBAJVgM WSASpgA+yQ B7YBApBMdg J9oBqUAcaQ TNoBcdBJzg FzoNL4Bq4A W6D+2AUTIB nYBa8BgsQB GEhMkSB5CE VSBPSh8wgB mQPuUG+UBA UCcVCCRAPE kJ50GaoGCq DqqF6qBn6H joJnYeuQIP QXWgMmoZ+h 97BCEyCqbA SrAUbwwzYC faBQ+BVcAK 8Bs6FC+Adc CXcAB+FO+D z8DX4NjwKP 4PnEIAQERq iihgiDMQF8 UeikHiEj6x HipAKpAFpR bqRPuQmMor MIG9RGBQFR UcZomxRnqh QFAu1BrUeV YKqRh1GdaB 6UTdRY6hZ1 Ec0Ga2I1kf boL3QEegEd Ba6EF2BbkK 3oy+ib6Mn0 K8xGAwNo42 xwnhiIjFJm LWYEsw+TBv mHGYQM46Zw 2Kx8lh9rB3 WH8vECrCF2 CrsUexZ7BB 2AvsGR8Sp4 Mxw7rgoHA+ Xj6vAHcGdw Q3hJnELeCm 8Jt4G749n4 3PwpfhGfDf +On4Cv0CQJ mgT7AghhCT CJkIloZVwk fCA8JJIJKo RrYmBRC5xI 7GSeIx4mTh GfEuSIemRX EjRJCFpB+k Q6RzpLuklm UzWIjuSo8g C8g5yM/kC+ RH5jQRFwkj CS4ItsUGiR qJDYkjiuSR eUlPSSXK1Z K5kheQJyeu SM1J4KS0pF ymm1HqpGqm TUiNSc9IUa VNpf+lU6RL pI9JXpKdks DJaMm4ybJk CmYMyF2TGK QhFneJCYVE 2UxopFykTV AxVm+pFTaI WU7+jDlBnZ WVkl8mGyWb L1sielh2lI TQtmhcthVZ KO04bpr1bo rTEaQlnyfY lrUuGlszLL ZVzlOPIFcm 1yd2WeydPl 3eTT5bfJd8 p/1ABpaCnE KiQpbBf4aL CzFLqUtulr KVFS48vvac IK+opBimuV Tyo2K84p6S s5KGUrlSld EFpRpmm7Ki cpFyufEZ5W oWiYq/CVSl XOavylC5Ld 6Kn0CvpvfR ZVUVVT1Wha r3qgOqCmrZ aqFq+WpvaQ 3WCOkM9Xr1 cvUd9VkNFw 08jT6NF454 mXpOhmai5V 7NPc15LWyt ca6tWp9aUt py2l3audov 2Ax2yjoPOG p0GnVu6GF2 GbrLuPt0be rCehV6iXo3 edX1Y31Kfq 79Pf9AAbWB twDNoMBgxJ Bk6GWYathi OGdGMfI3yj TqNnhtrGEc Z7zLuM/5oY mGSYtJoct9 UxtTbNN+02 /R3Mz0zllm N2S1zsrm7+ QbzLvMXy/S XcZbtX3bHg mLhZ7HVosf ig6WVJd+y1 XLaSsMq1qr WaoRBZQQwS hiXrdHWztY brE9Zv7Wxt BHYHLf5zdb QNtn2iO3Uc u3lnOWNy8f t1OyYdvV2o /Z0+1j7A/a jDqoOTIcGh 8eO6o5sxyb HSSddpySno 07PnU2c+c7 tzvMuNi7rX M65Iq4erkW uA24ybqFu1 W6P3NXcE9x b3Gc9LDzWe pzzRHv6eO7 yHPFS8mJ5N XvNelt5r/P u9SH5BPtU+ zz21fPl+3b 7wX7efrv9H qzQXMFb0ek P/L38d/s/D NAOWBPwYyA mMCCwJvBJk GlQXlBfMCU 4JvhI8OsQ5 5DSkPuhOqH C0J4wybDos Oaw+XDX8LL w0QjjiHUR1 yIVIrmRXVH YqLCopqi5l W4r96yciLa ILoweXqW9K nvVldUKq1N Wn46RjGHGn IhFx4bHHol 9z/RnNjDn4 rziauNmWS6 svaxnbEd2O XuaY8cp40z G28WXxU8l2 CXsTphOdEi sSJzhunCru S+SPJPqkua T/ZMPJX9KC U9pS8Wlxqa e5Mnwknm9a cpp2WmD6fr phemja2zW7 Fkzy/fhN2V AGasyugRU0 c9Uv1BHuEU 4lmmfWZP5J iss60S2dDY vuz9HL2d7z mSue+63a1F rWWt78lTzN uWNrXNaV78 eWh+3vmeD+ oaCDRMbPTY e3kTYlLzpp 3yT/LL8V5v DN3cXKBVsL Bjf4rGlpVC ikF84stV2a 9021DbutoH t5turtn8sY hddLTYprih +X8IqufqN6 TeV33zaEb9 joNSydP9Oz E7ezuFdDrs Ol0mX5ZaN7 /bb3VFOLy8 qf7UnZs+Vi mUVdXsJe4V 7Ryt9K7uqN Kp2Vr2vTqy +XeNc01arW Lu9dn4fe9/ Qfsf9rXVKd cV17w5wD9y p96jvaNBqq DiIOZh58El jWGPft4xvm 5sUmoqbPhz iHRo9HHS4t 9mqufmI4pH SFrhF2DJ9N Proje9cv+t qNWytb6O1F R8Dx4THnn4 f+/3wcZ/jP ScYJ1p/0Py htp3SXtQBd eR0zHYmdo5 2RXYNnvQ+2 dNt293+o9G Ph06pnqo5L Xu69AzhTMG ZT2dzz86dS z83cz7h/Hh PTM/9CxEXb vUG9g5c9Ll 4+ZL7pQt9T n1nL9tdPnX F5srJq4yrn dcsr3X0W/S 3/2TxU/uA5 UDHdavrXTe sb3QPLh88M +QwdP6m681 Lt7xuXbu94 vbgcOjwnZH okdE77DtTd 1PuvriXeW/ h/sYH6AdFD 6UeVjxSfNT ws+7PbaOWo 6fHXMf6Hwc /vj/OGn/2S 8Yv7ycKnpC fVEyqTDZPm U2dmnafvvF 05dOJZ+nPF mYKf5X+tfa 5zvMffnP8r X82YnbiBf/ Fp99LXsq/P PRq2aueuYC 5R69TXy/MF 72Rf3P4LeN t37vwd5MLW e+x7ys/6H7 o/ujz8cGn1 E+f/gUDmPP 8usTo0wAAA AlwSFlzAAA OxAAADsQBl SsOGwAAAG5 JREFUOE+Vj MENwDAIA5O hOkX3n4eqS K4cakfhEeQ 7E0ZE5JvXH e8Dn7rWsnK tZTD79oGa7 bJyKttl5cD sbcEerNwnI WpmVk5+4sy s3CJrWVk5W 4CdB28PuMy cQxW7zJxDF WDnwfbAqWs t/12MB+3XX GPkZTU+AAA AAElFTkSuQ mCC</a:Ima geSource>< a:ImageStr eam i:nil= "true"/><a :Name>RPC or DCOM</a :Name><a:P arentId>GE .DF</a:Par entId><a:R epresentat ion>Line</ a:Represen tation><a: Shape i:ni l="true"/> </a:Elemen tType><a:E lementType ><a:IsExte nsion>fals e</a:IsExt ension><a: Attributes /><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
96 | A re presentati on of an ( Advanced) Local Proc edure Call data flow . | |
97 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.ALPC< /a:Id><a:I mageLocati on>Before label</a:I mageLocati on><a:Imag eSource>iV BORw0KGgoA AAANSUhEUg AAABAAAAAQ CAYAAAAf8/ 9hAAAABGdB TUEAALGOfP tRkwAAACBj SFJNAACHDw AAjA8AAP1S AACBQAAAfX kAAOmLAAA8 5QAAGcxzPI V3AAAKOWlD Q1BQaG90b3 Nob3AgSUND IHByb2ZpbG UAAEjHnZZ3 VFTXFofPvX d6oc0wAlKG 3rvAANJ7k1 5FYZgZYCgD DjM0sSGiAh FFRJoiSFDE gNFQJFZEsR AUVLAHJAgo MRhFVCxvRt aLrqy89/Ly ++Osb+2z97 n77L3PWhcA kqcvl5cGSw GQyhPwgzyc 6RGRUXTsAI ABHmCAKQBM Vka6X7B7CB DJy82FniFy Al8EAfB6WL wCcNPQM4BO B/+fpFnpfI HomAARm7M5 GSwRF4g4JU uQLrbPipga lyxmGCVmvi hBEcuJOWGR DT77LLKjmN mpPLaIxTmn s1PZYu4V8b ZMIUfEiK+I CzO5nCwR3x KxRoowlSvi N+LYVA4zAw AUSWwXcFiJ IjYRMYkfEu Qi4uUA4EgJ X3HcVyzgZA vEl3JJS8/h cxMSBXQdli 7d1NqaQffk ZKVwBALDAC Yrmcln013S UtOZvBwAFu /8WTLi2tJF RbY0tba0ND QzMv2qUP91 829K3NtFeh n4uWcQrf+L 7a/80hoAYM yJarPziy2u CoDOLQDI3f ti0zgAgKSo bx3Xv7oPTT wviQJBuo2x cVZWlhGXwz ISF/QP/U+H v6GvvmckPu 6P8tBdOfFM YYqALq4bKy 0lTcinZ6Qz WRy64Z+H+B 8H/nUeBkGc eA6fwxNFhI mmjMtLELWb x+YKuGk8Op f3n5r4D8P+ pMW5FonS+B FQY4yA1HUq QH7tBygKES DR+8Vd/6Nv vvgwIH554S qTi3P/7zf9 Z8Gl4iWDm/ A5ziUohM4S 8jMX98TPEq ABAUgCKpAH ykAd6ABDYA asgC1wBG7A G/iDEBAJVg MWSASpgA+y QB7YBApBMd gJ9oBqUAca QTNoBcdBJz gFzoNL4Bq4 AW6D+2AUTI BnYBa8BgsQ BGEhMkSB5C EVSBPSh8wg BmQPuUG+UB AUCcVCCRAP EkJ50GaoGC qDqqF6qBn6 HjoJnYeuQI PQXWgMmoZ+ h97BCEyCqb ASrAUbwwzY CfaBQ+BVcA K8Bs6FC+Ad cCXcAB+FO+ Dz8DX4NjwK P4PnEIAQER qiihgiDMQF 8UeikHiEj6 xHipAKpAFp RbqRPuQmMo rMIG9RGBQF RUcZomxRnq hQFAu1BrUe VYKqRh1Gda B6UTdRY6hZ 1Ec0Ga2I1k fboL3QEegE dBa6EF2Bbk K3oy+ib6Mn 0K8xGAwNo4 2xwnhiIjFJ mLWYEsw+TB vmHGYQM46Z w2Kx8lh9rB 3WH8vECrCF 2CrsUexZ7B B2AvsGR8Sp 4Mxw7rgoHA +Xj6vAHcGd wQ3hJnELeC m8Jt4G749n 43PwpfhGfD f+On4Cv0CQ JmgT7AghhC TCJkIloZVw kfCA8JJIJK oRrYmBRC5x I7GSeIx4mT hGfEuSIemR XEjRJCFpB+ kQ6RzpLukl mUzWIjuSo8 gC8g5yM/kC +RH5jQRFwk jCS4ItsUGi RqJDYkjiuS ReUlPSSXK1 ZK5kheQJye uSM1J4KS0p Fymm1HqpGq mTUiNSc9IU aVNpf+lU6R LpI9JXpKdk sDJaMm4ybJ kCmYMyF2TG KQhFneJCYV E2UxopFykT VAxVm+pFTa IWU7+jDlBn ZWVkl8mGyW bL1sielh2l ITQtmhcthV ZKO04bpr1b orTEaQlnyf YlrUuGlszL LZVzlOPIFc m1yd2WeydP l3eTT5bfJd 8p/1ABpaCn EKiQpbBf4a LCzFLqUtul rKVFS48vva cIK+opBimu VTyo2K84p6 Ss5KGUrlSl dEFpRpmm7K icpFyufEZ5 WoWiYq/CVS lXOavylC5L d6Kn0Cvpvf RZVUVVT1Wh ar3qgOqCmr ZaqFq+Wpva Q3WCOkM9Xr 1cvUd9VkNF w08jT6NF45 4mXpOhmai5 V7NPc15LWy tca6tWp9aU tpy2l3audo v2Ax2yjoPO Gp0GnVu6GF 2GbrLuPt0b erCehV6iXo 3edX1Y31Kf q79Pf9AAbW BtwDNoMBgx JBk6GWYath iOGdGMfI3y jTqNnhtrGE cZ7zLuM/5o YmGSYtJoct 9UxtTbNN+0 2/R3Mz0zll mN2S1zsrm7 +QbzLvMXy/ SXcZbtX3bH gmLhZ7HVos fig6WVJd+y 1XLaSsMq1q rWaoRBZQQw ShiXrdHWzt YbrE9Zv7Wx tBHYHLf5zd bQNtn2iO3U cu3lnOWNy8 ft1OyYdvV2 o/Z0+1j7A/ ajDqoOTIcG h8eO6o5sxy bHSSddpySn o07PnU2c+c 7tzvMuNi7r XM65Iq4erk WuA24ybqFu 1W6P3NXcE9 xb3Gc9LDzW epzzRHv6eO 7yHPFS8mJ5 NXvNelt5r/ Pu9SH5BPtU +zz21fPl+3 b7wX7efrv9 HqzQXMFb0e kP/L38d/s/ DNAOWBPwYy AmMCCwJvBJ kGlQXlBfMC U4JvhI8OsQ 55DSkPuhOq HC0J4wybDo sOaw+XDX8L Lw0QjjiHUR 1yIVIrmRXV HYqLCopqi5 lW4r96yciL aILoweXqW9 KnvVldUKq1 NWn46RjGHG nIhFx4bHHo l9z/RnNjDn 4rziauNmWS 6svaxnbEd2 OXuaY8cp40 zG28WXxU8l 2CXsTphOdE isSJzhunCr uS+SPJPqku aT/ZMPJX9K CU9pS8Wlxq ae5Mnwknm9 acpp2WmD6f rphemja2zW 7Fkzy/fhN2 VAGasyugRU 0c9Uv1BHuE U4lmmfWZP5 Jiss60S2dD Yvuz9HL2d7 zmSue+63a1 FrWWt78lTz NuWNrXNaV7 8eWh+3vmeD +oaCDRMbPT Ye3kTYlLzp p3yT/LL8V5 vDN3cXKBVs LBjf4rGlpV CikF84stV2 a9021Dbuto Ht5turtn8s YhddLTYpri h+X8IqufqN 6TeV33zaEb 9joNSydP9O zE7ezuFdDr sOl0mX5ZaN 7/bb3VFOLy 8qf7UnZs+V imUVdXsJe4 V7Ryt9K7uq NKp2Vr2vTq y+XeNc01ar WLu9dn4fe9 /Qfsf9rXVK dcV17w5wD9 yp96jvaNBq qDiIOZh58E ljWGPft4xv m5sUmoqbPh ziHRo9HHS4 t9mqufmI4p HSFrhF2DJ9 NProje9cv+ tqNWytb6O1 FR8Dx4THnn 4f+/3wcZ/j PScYJ1p/0P yhtp3SXtQB deR0zHYmdo 52RXYNnvQ+ 2dNt293+o9 GPh06pnqo5 LXu69AzhTM GZT2dzz86d Sz83cz7h/H hPTM/9CxEX bvUG9g5c9L l4+ZL7pQt9 Tn1nL9tdPn XF5srJq4yr ndcsr3X0W/ S3/2TxU/uA 5UDHdavrXT esb3QPLh88 M+QwdP6m68 1Lt7xuXbu9 4vbgcOjwnZ HokdE77DtT d1PuvriXeW /h/sYH6AdF D6UeVjxSfN Tws+7PbaOW o6fHXMf6Hw c/vj/OGn/2 S8Yv7ycKnp CfVEyqTDZP mU2dmnafvv F05dOJZ+nP FmYKf5X+tf a5zvMffnP8 rX82YnbiBf /Fp99LXsq/ PPRq2aueuY C5R69TXy/M F72Rf3P4Le Nt37vwd5ML We+x7ys/6H 7o/ujz8cGn 1E+f/gUDmP P8usTo0wAA AAlwSFlzAA AOxAAADsQB lSsOGwAAAE tJREFUOE9j +P//P1bMaO r9Hx2jqwFh DAEYHngDYB iXRhjGKoiM R5IBIIWkYm wGgGh0jFN8 OBkA4qBhbG JYxbEagMNQ rOIUGuD9Hw BIkRfD8QF9 EgAAAABJRU 5ErkJggg== </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>ALPC</a :Name><a:P arentId>GE .DF</a:Par entId><a:R epresentat ion>Line</ a:Represen tation><a: Shape i:ni l="true"/> </a:Elemen tType><a:E lementType ><a:IsExte nsion>fals e</a:IsExt ension><a: Attributes /><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
98 | User Data Prot ocol Trans port. | |
99 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.UDP</ a:Id><a:Im ageLocatio n>Before l abel</a:Im ageLocatio n><a:Image Source>iVB ORw0KGgoAA AANSUhEUgA AABAAAAAQC AYAAAAf8/9 hAAAABGdBT UEAALGOfPt RkwAAACBjS FJNAACHDwA AjA8AAP1SA ACBQAAAfXk AAOmLAAA85 QAAGcxzPIV 3AAAKOWlDQ 1BQaG90b3N ob3AgSUNDI HByb2ZpbGU AAEjHnZZ3V FTXFofPvXd 6oc0wAlKG3 rvAANJ7k15 FYZgZYCgDD jM0sSGiAhF FRJoiSFDEg NFQJFZEsRA UVLAHJAgoM RhFVCxvRta Lrqy89/Ly+ +Osb+2z97n 77L3PWhcAk qcvl5cGSwG QyhPwgzyc6 RGRUXTsAIA BHmCAKQBMV ka6X7B7CBD Jy82FniFyA l8EAfB6WLw CcNPQM4BOB /+fpFnpfIH omAARm7M5G SwRF4g4JUu QLrbPipgal yxmGCVmvih BEcuJOWGRD T77LLKjmNm pPLaIxTmns 1PZYu4V8bZ MIUfEiK+IC zO5nCwR3xK xRoowlSviN +LYVA4zAwA USWwXcFiJI jYRMYkfEuQ i4uUA4EgJX 3HcVyzgZAv El3JJS8/hc xMSBXQdli7 d1NqaQffkZ KVwBALDACY rmcln013SU tOZvBwAFu/ 8WTLi2tJFR bY0tba0NDQ zMv2qUP918 29K3NtFehn 4uWcQrf+L7 a/80hoAYMy JarPziy2uC oDOLQDI3ft i0zgAgKSob x3Xv7oPTTw viQJBuo2xc VZWlhGXwzI SF/QP/U+Hv 6GvvmckPu6 P8tBdOfFMY YqALq4bKy0 lTcinZ6QzW Ry64Z+H+B8 H/nUeBkGce A6fwxNFhIm mjMtLELWbx +YKuGk8Opf 3n5r4D8P+p MW5FonS+BF QY4yA1HUqQ H7tBygKESD R+8Vd/6Nvv vgwIH554Sq Ti3P/7zf9Z 8Gl4iWDm/A 5ziUohM4S8 jMX98TPEqA BAUgCKpAHy kAd6ABDYAa sgC1wBG7AG /iDEBAJVgM WSASpgA+yQ B7YBApBMdg J9oBqUAcaQ TNoBcdBJzg FzoNL4Bq4A W6D+2AUTIB nYBa8BgsQB GEhMkSB5CE VSBPSh8wgB mQPuUG+UBA UCcVCCRAPE kJ50GaoGCq DqqF6qBn6H joJnYeuQIP QXWgMmoZ+h 97BCEyCqbA SrAUbwwzYC faBQ+BVcAK 8Bs6FC+Adc CXcAB+FO+D z8DX4NjwKP 4PnEIAQERq iihgiDMQF8 UeikHiEj6x HipAKpAFpR bqRPuQmMor MIG9RGBQFR UcZomxRnqh QFAu1BrUeV YKqRh1GdaB 6UTdRY6hZ1 Ec0Ga2I1kf boL3QEegEd Ba6EF2BbkK 3oy+ib6Mn0 K8xGAwNo42 xwnhiIjFJm LWYEsw+TBv mHGYQM46Zw 2Kx8lh9rB3 WH8vECrCF2 CrsUexZ7BB 2AvsGR8Sp4 Mxw7rgoHA+ Xj6vAHcGdw Q3hJnELeCm 8Jt4G749n4 3PwpfhGfDf +On4Cv0CQJ mgT7AghhCT CJkIloZVwk fCA8JJIJKo RrYmBRC5xI 7GSeIx4mTh GfEuSIemRX EjRJCFpB+k Q6RzpLuklm UzWIjuSo8g C8g5yM/kC+ RH5jQRFwkj CS4ItsUGiR qJDYkjiuSR eUlPSSXK1Z K5kheQJyeu SM1J4KS0pF ymm1HqpGqm TUiNSc9IUa VNpf+lU6RL pI9JXpKdks DJaMm4ybJk CmYMyF2TGK QhFneJCYVE 2UxopFykTV AxVm+pFTaI WU7+jDlBnZ WVkl8mGyWb L1sielh2lI TQtmhcthVZ KO04bpr1bo rTEaQlnyfY lrUuGlszLL ZVzlOPIFcm 1yd2WeydPl 3eTT5bfJd8 p/1ABpaCnE KiQpbBf4aL CzFLqUtulr KVFS48vvac IK+opBimuV Tyo2K84p6S s5KGUrlSld EFpRpmm7Ki cpFyufEZ5W oWiYq/CVSl XOavylC5Ld 6Kn0CvpvfR ZVUVVT1Wha r3qgOqCmrZ aqFq+WpvaQ 3WCOkM9Xr1 cvUd9VkNFw 08jT6NF454 mXpOhmai5V 7NPc15LWyt ca6tWp9aUt py2l3audov 2Ax2yjoPOG p0GnVu6GF2 GbrLuPt0be rCehV6iXo3 edX1Y31Kfq 79Pf9AAbWB twDNoMBgxJ Bk6GWYathi OGdGMfI3yj TqNnhtrGEc Z7zLuM/5oY mGSYtJoct9 UxtTbNN+02 /R3Mz0zllm N2S1zsrm7+ QbzLvMXy/S XcZbtX3bHg mLhZ7HVosf ig6WVJd+y1 XLaSsMq1qr WaoRBZQQwS hiXrdHWztY brE9Zv7Wxt BHYHLf5zdb QNtn2iO3Uc u3lnOWNy8f t1OyYdvV2o /Z0+1j7A/a jDqoOTIcGh 8eO6o5sxyb HSSddpySno 07PnU2c+c7 tzvMuNi7rX M65Iq4erkW uA24ybqFu1 W6P3NXcE9x b3Gc9LDzWe pzzRHv6eO7 yHPFS8mJ5N XvNelt5r/P u9SH5BPtU+ zz21fPl+3b 7wX7efrv9H qzQXMFb0ek P/L38d/s/D NAOWBPwYyA mMCCwJvBJk GlQXlBfMCU 4JvhI8OsQ5 5DSkPuhOqH C0J4wybDos Oaw+XDX8LL w0QjjiHUR1 yIVIrmRXVH YqLCopqi5l W4r96yciLa ILoweXqW9K nvVldUKq1N Wn46RjGHGn IhFx4bHHol 9z/RnNjDn4 rziauNmWS6 svaxnbEd2O XuaY8cp40z G28WXxU8l2 CXsTphOdEi sSJzhunCru S+SPJPqkua T/ZMPJX9KC U9pS8Wlxqa e5Mnwknm9a cpp2WmD6fr phemja2zW7 Fkzy/fhN2V AGasyugRU0 c9Uv1BHuEU 4lmmfWZP5J iss60S2dDY vuz9HL2d7z mSue+63a1F rWWt78lTzN uWNrXNaV78 eWh+3vmeD+ oaCDRMbPTY e3kTYlLzpp 3yT/LL8V5v DN3cXKBVsL Bjf4rGlpVC ikF84stV2a 9021DbutoH t5turtn8sY hddLTYprih +X8IqufqN6 TeV33zaEb9 joNSydP9Oz E7ezuFdDrs Ol0mX5ZaN7 /bb3VFOLy8 qf7UnZs+Vi mUVdXsJe4V 7Ryt9K7uqN Kp2Vr2vTqy +XeNc01arW Lu9dn4fe9/ Qfsf9rXVKd cV17w5wD9y p96jvaNBqq DiIOZh58El jWGPft4xvm 5sUmoqbPhz iHRo9HHS4t 9mqufmI4pH SFrhF2DJ9N Proje9cv+t qNWytb6O1F R8Dx4THnn4 f+/3wcZ/jP ScYJ1p/0Py htp3SXtQBd eR0zHYmdo5 2RXYNnvQ+2 dNt293+o9G Ph06pnqo5L Xu69AzhTMG ZT2dzz86dS z83cz7h/Hh PTM/9CxEXb vUG9g5c9Ll 4+ZL7pQt9T n1nL9tdPnX F5srJq4yrn dcsr3X0W/S 3/2TxU/uA5 UDHdavrXTe sb3QPLh88M +QwdP6m681 Lt7xuXbu94 vbgcOjwnZH okdE77DtTd 1PuvriXeW/ h/sYH6AdFD 6UeVjxSfNT ws+7PbaOWo 6fHXMf6Hwc /vj/OGn/2S 8Yv7ycKnpC fVEyqTDZPm U2dmnafvvF 05dOJZ+nPF mYKf5X+tfa 5zvMffnP8r X82YnbiBf/ Fp99LXsq/P PRq2aueuYC 5R69TXy/MF 72Rf3P4LeN t37vwd5MLW e+x7ys/6H7 o/ujz8cGn1 E+f/gUDmPP 8usTo0wAAA AlwSFlzAAA OxAAADsQBl SsOGwAAAEt JREFUOE9j+ P//P1bMaOr 9Hx2jqwFhD AEYHngDYBi XRhjGKoiMR 5IBIIWkYmw GgGh0jFN8O BkA4qBhbGJ YxbEagMNQr OIUGuD9HwB IkRfD8QF9E gAAAABJRU5 ErkJggg==< /a:ImageSo urce><a:Im ageStream i:nil="tru e"/><a:Nam e>UDP</a:N ame><a:Par entId>GE.D F</a:Paren tId><a:Rep resentatio n>Line</a: Representa tion><a:Sh ape i:nil= "true"/></ a:ElementT ype><a:Ele mentType>< a:IsExtens ion>false< /a:IsExten sion><a:At tributes/> <a:Availab leToBaseMo dels xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.E xternalSto rage.OM"/> <a:Behavio r i:nil="t rue"/><a:D escription > | |
100 | An i nterface f or an appl ication to communica te to a de vice drive r. | |
101 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.DF.TM Core.IOCTL </a:Id><a: ImageLocat ion>Before label</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGOf PtRkwAAACB jSFJNAACHD wAAjA8AAP1 SAACBQAAAf XkAAOmLAAA 85QAAGcxzP IV3AAAKOWl DQ1BQaG90b 3Nob3AgSUN DIHByb2Zpb GUAAEjHnZZ 3VFTXFofPv Xd6oc0wAlK G3rvAANJ7k 15FYZgZYCg DDjM0sSGiA hFFRJoiSFD EgNFQJFZEs RAUVLAHJAg oMRhFVCxvR taLrqy89/L y++Osb+2z9 7n77L3PWhc Akqcvl5cGS wGQyhPwgzy c6RGRUXTsA IABHmCAKQB MVka6X7B7C BDJy82FniF yAl8EAfB6W LwCcNPQM4B OB/+fpFnpf IHomAARm7M 5GSwRF4g4J UuQLrbPipg alyxmGCVmv ihBEcuJOWG RDT77LLKjm NmpPLaIxTm ns1PZYu4V8 bZMIUfEiK+ ICzO5nCwR3 xKxRoowlSv iN+LYVA4zA wAUSWwXcFi JIjYRMYkfE uQi4uUA4Eg JX3HcVyzgZ AvEl3JJS8/ hcxMSBXQdl i7d1NqaQff kZKVwBALDA CYrmcln013 SUtOZvBwAF u/8WTLi2tJ FRbY0tba0N DQzMv2qUP9 1829K3NtFe hn4uWcQrf+ L7a/80hoAY MyJarPziy2 uCoDOLQDI3 fti0zgAgKS obx3Xv7oPT TwviQJBuo2 xcVZWlhGXw zISF/QP/U+ Hv6GvvmckP u6P8tBdOfF MYYqALq4bK y0lTcinZ6Q zWRy64Z+H+ B8H/nUeBkG ceA6fwxNFh ImmjMtLELW bx+YKuGk8O pf3n5r4D8P +pMW5FonS+ BFQY4yA1HU qQH7tBygKE SDR+8Vd/6N vvvgwIH554 SqTi3P/7zf 9Z8Gl4iWDm /A5ziUohM4 S8jMX98TPE qABAUgCKpA HykAd6ABDY AasgC1wBG7 AG/iDEBAJV gMWSASpgA+ yQB7YBApBM dgJ9oBqUAc aQTNoBcdBJ zgFzoNL4Bq 4AW6D+2AUT IBnYBa8Bgs QBGEhMkSB5 CEVSBPSh8w gBmQPuUG+U BAUCcVCCRA PEkJ50GaoG CqDqqF6qBn 6HjoJnYeuQ IPQXWgMmoZ +h97BCEyCq bASrAUbwwz YCfaBQ+BVc AK8Bs6FC+A dcCXcAB+FO +Dz8DX4Njw KP4PnEIAQE RqiihgiDMQ F8UeikHiEj 6xHipAKpAF pRbqRPuQmM orMIG9RGBQ FRUcZomxRn qhQFAu1BrU eVYKqRh1Gd aB6UTdRY6h Z1Ec0Ga2I1 kfboL3QEeg EdBa6EF2Bb kK3oy+ib6M n0K8xGAwNo 42xwnhiIjF JmLWYEsw+T BvmHGYQM46 Zw2Kx8lh9r B3WH8vECrC F2CrsUexZ7 BB2AvsGR8S p4Mxw7rgoH A+Xj6vAHcG dwQ3hJnELe Cm8Jt4G749 n43PwpfhGf Df+On4Cv0C QJmgT7Aghh CTCJkIloZV wkfCA8JJIJ KoRrYmBRC5 xI7GSeIx4m ThGfEuSIem RXEjRJCFpB +kQ6RzpLuk lmUzWIjuSo 8gC8g5yM/k C+RH5jQRFw kjCS4ItsUG iRqJDYkjiu SReUlPSSXK 1ZK5kheQJy euSM1J4KS0 pFymm1HqpG qmTUiNSc9I UaVNpf+lU6 RLpI9JXpKd ksDJaMm4yb JkCmYMyF2T GKQhFneJCY VE2UxopFyk TVAxVm+pFT aIWU7+jDlB nZWVkl8mGy WbL1sielh2 lITQtmhcth VZKO04bpr1 borTEaQlny fYlrUuGlsz LLZVzlOPIF cm1yd2Weyd Pl3eTT5bfJ d8p/1ABpaC nEKiQpbBf4 aLCzFLqUtu lrKVFS48vv acIK+opBim uVTyo2K84p 6Ss5KGUrlS ldEFpRpmm7 KicpFyufEZ 5WoWiYq/CV SlXOavylC5 Ld6Kn0Cvpv fRZVUVVT1W har3qgOqCm rZaqFq+Wpv aQ3WCOkM9X r1cvUd9VkN Fw08jT6NF4 54mXpOhmai 5V7NPc15LW ytca6tWp9a Utpy2l3aud ov2Ax2yjoP OGp0GnVu6G F2GbrLuPt0 berCehV6iX o3edX1Y31K fq79Pf9AAb WBtwDNoMBg xJBk6GWYat hiOGdGMfI3 yjTqNnhtrG EcZ7zLuM/5 oYmGSYtJoc t9UxtTbNN+ 02/R3Mz0zl lmN2S1zsrm 7+QbzLvMXy /SXcZbtX3b HgmLhZ7HVo sfig6WVJd+ y1XLaSsMq1 qrWaoRBZQQ wShiXrdHWz tYbrE9Zv7W xtBHYHLf5z dbQNtn2iO3 Ucu3lnOWNy 8ft1OyYdvV 2o/Z0+1j7A /ajDqoOTIc Gh8eO6o5sx ybHSSddpyS no07PnU2c+ c7tzvMuNi7 rXM65Iq4er kWuA24ybqF u1W6P3NXcE 9xb3Gc9LDz WepzzRHv6e O7yHPFS8mJ 5NXvNelt5r /Pu9SH5BPt U+zz21fPl+ 3b7wX7efrv 9HqzQXMFb0 ekP/L38d/s /DNAOWBPwY yAmMCCwJvB JkGlQXlBfM CU4JvhI8Os Q55DSkPuhO qHC0J4wybD osOaw+XDX8 LLw0QjjiHU R1yIVIrmRX VHYqLCopqi 5lW4r96yci LaILoweXqW 9KnvVldUKq 1NWn46RjGH GnIhFx4bHH ol9z/RnNjD n4rziauNmW S6svaxnbEd 2OXuaY8cp4 0zG28WXxU8 l2CXsTphOd EisSJzhunC ruS+SPJPqk uaT/ZMPJX9 KCU9pS8Wlx qae5Mnwknm 9acpp2WmD6 frphemja2z W7Fkzy/fhN 2VAGasyugR U0c9Uv1BHu EU4lmmfWZP 5Jiss60S2d DYvuz9HL2d 7zmSue+63a 1FrWWt78lT zNuWNrXNaV 78eWh+3vme D+oaCDRMbP TYe3kTYlLz pp3yT/LL8V 5vDN3cXKBV sLBjf4rGlp VCikF84stV 2a9021Dbut oHt5turtn8 sYhddLTYpr ih+X8Iqufq N6TeV33zaE b9joNSydP9 OzE7ezuFdD rsOl0mX5Za N7/bb3VFOL y8qf7UnZs+ VimUVdXsJe 4V7Ryt9K7u qNKp2Vr2vT qy+XeNc01a rWLu9dn4fe 9/Qfsf9rXV KdcV17w5wD 9yp96jvaNB qqDiIOZh58 EljWGPft4x vm5sUmoqbP hziHRo9HHS 4t9mqufmI4 pHSFrhF2DJ 9NProje9cv +tqNWytb6O 1FR8Dx4THn n4f+/3wcZ/ jPScYJ1p/0 Pyhtp3SXtQ BdeR0zHYmd o52RXYNnvQ +2dNt293+o 9GPh06pnqo 5LXu69AzhT MGZT2dzz86 dSz83cz7h/ HhPTM/9CxE XbvUG9g5c9 Ll4+ZL7pQt 9Tn1nL9tdP nXF5srJq4y rndcsr3X0W /S3/2TxU/u A5UDHdavrX Tesb3QPLh8 8M+QwdP6m6 81Lt7xuXbu 94vbgcOjwn ZHokdE77Dt Td1PuvriXe W/h/sYH6Ad FD6UeVjxSf NTws+7PbaO Wo6fHXMf6H wc/vj/OGn/ 2S8Yv7ycKn pCfVEyqTDZ PmU2dmnafv vF05dOJZ+n PFmYKf5X+t fa5zvMffnP 8rX82YnbiB f/Fp99LXsq /PPRq2aueu YC5R69TXy/ MF72Rf3P4L eNt37vwd5M LWe+x7ys/6 H7o/ujz8cG n1E+f/gUDm PP8usTo0wA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA EtJREFUOE9 j+P//P1bMa Or9Hx2jqwF hDAEYHngDY BiXRhjGKoi MR5IBIIWkY mwGgGh0jFN 8OBkA4qBhb GJYxbEagMN QrOIUGuD9H wBIkRfD8QF 9EgAAAABJR U5ErkJggg= =</a:Image Source><a: ImageStrea m i:nil="t rue"/><a:N ame>IOCTL Interface< /a:Name><a :ParentId> GE.DF</a:P arentId><a :Represent ation>Line </a:Repres entation>< a:Shape i: nil="true" /></a:Elem entType><a :ElementTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Attribut es/><a:Ava ilableToBa seModels x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Externa lStorage.O M"/><a:Beh avior i:ni l="true"/> <a:Descrip tion> | |
102 | An a rc represe ntation of an Intern et trust b oundary. | |
103 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.L. TMCore.Int ernet</a:I d><a:Image Location>B efore labe l</a:Image Location>< a:ImageSou rce>iVBORw 0KGgoAAAAN SUhEUgAAAB AAAAAQCAYA AAAf8/9hAA AAAXNSR0IA rs4c6QAAAA RnQU1BAACx jwv8YQUAAA AZdEVYdFNv ZnR3YXJlAE Fkb2JlIElt YWdlUmVhZH lxyWU8AAAB X0lEQVQ4T2 NgNPXGh/mh GJscGCNzQA rtgVgfxmcy 87kAwlA5ZL VwDGOAFQPp /1Dcj8zHZw iY4LUPdgLS MM0YmM8+5J aAY5gRkI3d AJuUUlsgjV UzCM/ZuDPg ////vEA2dg NAkqpBKTuB bKwGRNV0iQ NpmCZQGMG9 AxPk57IJvA 6ksRrAYu67 EEjLA7E+s7 nPReQwAWtG C0CiMMwQkP NZ5H0TtqAr IIRBAWueUC gM9gLQEG1Q GHDbBr1Yuf tQDJDvapFY tAhdEwwDY+ TO8cvXXUCW w8IAbMjCrX tDgDQHlK8E 04CO1YPTVo A0A9nwQIQZ AtYMxaBAw2 oAFINSLaoB SFgfGEgPgD Q2jWAs5hZV CaSxGwB0Ca +iX9I2IBus GORn3YistT A+q4Xf59KJ cy1BarEaAM JAQ8ABixRg 6omN/fWgwF 26Y38EzLsg hfiwNhBbAD ELlC8KxEpA zAHh/2cAAN CSU7ngF2Kp AAAAAElFTk SuQmCC</a: ImageSourc e><a:Image Stream i:n il="true"/ ><a:Name>I nternet Bo undary</a: Name><a:Pa rentId>GE. TB.L</a:Pa rentId><a: Representa tion>LineB oundary</a :Represent ation><a:S hape i:nil ="true"/>< /a:Element Type><a:El ementType> <a:IsExten sion>false </a:IsExte nsion><a:A ttributes/ ><a:Availa bleToBaseM odels xmln s:b="http: //schemas. datacontra ct.org/200 4/07/Threa tModeling. ExternalSt orage.OM"/ ><a:Behavi or i:nil=" true"/><a: Descriptio n> | |
104 | An a rc represe ntation of a machine trust bou ndary. | |
105 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.L. TMCore.Mac hine</a:Id ><a:ImageL ocation>Be fore label </a:ImageL ocation><a :ImageSour ce>iVBORw0 KGgoAAAANS UhEUgAAABA AAAAQCAYAA AAf8/9hAAA AAXNSR0IAr s4c6QAAAAR nQU1BAACxj wv8YQUAAAA ZdEVYdFNvZ nR3YXJlAEF kb2JlIEltY WdlUmVhZHl xyWU8AAABX 0lEQVQ4T2N gNPXGh/mhG JscGCNzQAr tgVgfxmcy8 7kAwlA5ZLV wDGOAFQPp/ 1Dcj8zHZwi Y4LUPdgLSM M0YmM8+5Ja AY5gRkI3dA JuUUlsgjVU zCM/ZuDPg/ ///vEA2dgN AkqpBKTuBb KwGRNV0iQN pmCZQGMG9A xPk57IJvA6 ksRrAYu67E EjLA7E+s7n PReQwAWtGC 0CiMMwQkPN Z5H0TtqArI IRBAWueUCg M9gLQEG1QG HDbBr1Yuft QDJDvapFYt AhdEwwDY+T O8cvXXUCWw 8IAbMjCrXt DgDQHlK8E0 4CO1YPTVoA 0A9nwQIQZA tYMxaBAw2o AFINSLaoBS FgfGEgPgDQ 2jWAs5hZVC aSxGwB0Ca+ iX9I2IBusG ORn3YistTA +q4Xf59KJc y1BarEaAMJ AQ8ABixRg6 omN/fWgwF2 6Y38EzLsgh fiwNhBbADE LlC8KxEpAz AHh/2cAANC SU7ngF2KpA AAAAElFTkS uQmCC</a:I mageSource ><a:ImageS tream i:ni l="true"/> <a:Name>Ma chine Trus t Boundary </a:Name>< a:ParentId >GE.TB.L</ a:ParentId ><a:Repres entation>L ineBoundar y</a:Repre sentation> <a:Shape i :nil="true "/></a:Ele mentType>< a:ElementT ype><a:IsE xtension>f alse</a:Is Extension> <a:Attribu tes/><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
106 | A bo rder repre sentation of user-mo del / kern el-mode se paration. | |
107 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.L. TMCore.Ker nel</a:Id> <a:ImageLo cation>Bef ore label< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA AXNSR0IArs 4c6QAAAARn QU1BAACxjw v8YQUAAAAZ dEVYdFNvZn R3YXJlAEFk b2JlIEltYW dlUmVhZHlx yWU8AAABX0 lEQVQ4T2Ng NPXGh/mhGJ scGCNzQArt gVgfxmcy87 kAwlA5ZLVw DGOAFQPp/1 Dcj8zHZwiY 4LUPdgLSMM 0YmM8+5JaA Y5gRkI3dAJ uUUlsgjVUz CM/ZuDPg// //vEA2dgNA kqpBKTuBbK wGRNV0iQNp mCZQGMG9Ax Pk57IJvA6k sRrAYu67EE jLA7E+s7nP ReQwAWtGC0 CiMMwQkPNZ 5H0TtqArII RBAWueUCgM 9gLQEG1QGH DbBr1YuftQ DJDvapFYtA hdEwwDY+TO 8cvXXUCWw8 IAbMjCrXtD gDQHlK8E04 CO1YPTVoA0 A9nwQIQZAt YMxaBAw2oA FINSLaoBSF gfGEgPgDQ2 jWAs5hZVCa SxGwB0Ca+i X9I2IBusGO Rn3YistTA+ q4Xf59KJcy 1BarEaAMJA Q8ABixRg6o mN/fWgwF26 Y38EzLsghf iwNhBbADEL lC8KxEpAzA Hh/2cAANCS U7ngF2KpAA AAAElFTkSu QmCC</a:Im ageSource> <a:ImageSt ream i:nil ="true"/>< a:Name>Use r mode or Kernel mod e Boundary </a:Name>< a:ParentId >GE.TB.L</ a:ParentId ><a:Repres entation>L ineBoundar y</a:Repre sentation> <a:Shape i :nil="true "/></a:Ele mentType>< a:ElementT ype><a:IsE xtension>f alse</a:Is Extension> <a:Attribu tes/><a:Av ailableToB aseModels xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Extern alStorage. OM"/><a:Be havior i:n il="true"/ ><a:Descri ption> | |
108 | A bo rder repre sentation for a Wind ow Store A ppContaine r boundary . | |
109 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.L. TMCore.App Container< /a:Id><a:I mageLocati on>Before label</a:I mageLocati on><a:Imag eSource>iV BORw0KGgoA AAANSUhEUg AAABAAAAAQ CAYAAAAf8/ 9hAAAAAXNS R0IArs4c6Q AAAARnQU1B AACxjwv8YQ UAAAAZdEVY dFNvZnR3YX JlAEFkb2Jl IEltYWdlUm VhZHlxyWU8 AAABX0lEQV Q4T2NgNPXG h/mhGJscGC NzQArtgVgf xmcy87kAwl A5ZLVwDGOA FQPp/1Dcj8 zHZwiY4LUP dgLSMM0YmM 8+5JaAY5gR kI3dAJuUUl sgjVUzCM/Z uDPg////vE A2dgNAkqpB KTuBbKwGRN V0iQNpmCZQ GMG9AxPk57 IJvA6ksRrA Yu67EEjLA7 E+s7nPReQw AWtGC0CiMM wQkPNZ5H0T tqArIIRBAW ueUCgM9gLQ EG1QGHDbBr 1YuftQDJDv apFYtAhdEw wDY+TO8cvX XUCWw8IAbM jCrXtDgDQH lK8E04CO1Y PTVoA0A9nw QIQZAtYMxa BAw2oAFINS LaoBSFgfGE gPgDQ2jWAs 5hZVCaSxGw B0Ca+iX9I2 IBusGORn3Y istTA+q4Xf 59KJcy1Bar EaAMJAQ8AB ixRg6omN/f WgwF26Y38E zLsghfiwNh BbADELlC8K xEpAzAHh/2 cAANCSU7ng F2KpAAAAAE lFTkSuQmCC </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>AppCont ainer Boun dary</a:Na me><a:Pare ntId>GE.TB .L</a:Pare ntId><a:Re presentati on>LineBou ndary</a:R epresentat ion><a:Sha pe i:nil=" true"/></a :ElementTy pe><a:Elem entType><a :IsExtensi on>false</ a:IsExtens ion><a:Att ributes/>< a:Availabl eToBaseMod els xmlns: b="http:// schemas.da tacontract .org/2004/ 07/ThreatM odeling.Ex ternalStor age.OM"/>< a:Behavior i:nil="tr ue"/><a:De scription> | |
110 | A bo rder repre sentation of a corpo rate netwo rk trust b oundary. | |
111 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.B. TMCore.Cor pNet</a:Id ><a:ImageL ocation>Be fore label </a:ImageL ocation><a :ImageSour ce>iVBORw0 KGgoAAAANS UhEUgAAABA AAAAQCAYAA AAf8/9hAAA ABGdBTUEAA LGPC/xhBQA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA Bl0RVh0U29 mdHdhcmUAQ WRvYmUgSW1 hZ2VSZWFke XHJZTwAAAB GSURBVDhPY /hPIWBQ9Ev 6z2jqDccPn r0ESxArzoD MAeEDZy+DF RIrDjeAVDC cDIDyyQajg TioAhGEQek dHx+bGIUGe P8HAJ4fIfJ ijo6MAAAAA ElFTkSuQmC C</a:Image Source><a: ImageStrea m i:nil="t rue"/><a:N ame>CorpNe t Trust Bo undary</a: Name><a:Pa rentId>GE. TB.B</a:Pa rentId><a: Representa tion>Borde rBoundary< /a:Represe ntation><a :Shape i:n il="true"/ ></a:Eleme ntType><a: ElementTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute s/><a:Avai lableToBas eModels xm lns:b="htt p://schema s.datacont ract.org/2 004/07/Thr eatModelin g.External Storage.OM "/><a:Beha vior i:nil ="true"/>< a:Descript ion> | |
112 | A bo rder repre sentation of a sandb ox trust b oundary. | |
113 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.B. TMCore.San dbox</a:Id ><a:ImageL ocation>Be fore label </a:ImageL ocation><a :ImageSour ce>iVBORw0 KGgoAAAANS UhEUgAAABA AAAAQCAYAA AAf8/9hAAA ABGdBTUEAA LGPC/xhBQA AAAlwSFlzA AAOxAAADsQ BlSsOGwAAA Bl0RVh0U29 mdHdhcmUAQ WRvYmUgSW1 hZ2VSZWFke XHJZTwAAAB GSURBVDhPY /hPIWBQ9Ev 6z2jqDccPn r0ESxArzoD MAeEDZy+DF RIrDjeAVDC cDIDyyQajg TioAhGEQek dHx+bGIUGe P8HAJ4fIfJ ijo6MAAAAA ElFTkSuQmC C</a:Image Source><a: ImageStrea m i:nil="t rue"/><a:N ame>Sandbo x Trust Bo undary Bor der</a:Nam e><a:Paren tId>GE.TB. B</a:Paren tId><a:Rep resentatio n>BorderBo undary</a: Representa tion><a:Sh ape i:nil= "true"/></ a:ElementT ype><a:Ele mentType>< a:IsExtens ion>false< /a:IsExten sion><a:At tributes>< a:Attribut e><a:IsExt ension>fal se</a:IsEx tension><a :Attribute Values xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .Interface s"><b:Valu e>No</b:Va lue><b:Val ue>Yes</b: Value></a: AttributeV alues><a:D isplayName >Low Integ rity Level Sandbox</ a:DisplayN ame><a:Inh eritance>V irtual</a: Inheritanc e><a:Mode> Dynamic</a :Mode><a:N ame>Integr ityLevel</ a:Name><a: Type>List< /a:Type></ a:Attribut e><a:Attri bute><a:Is Extension> false</a:I sExtension ><a:Attrib uteValues xmlns:b="h ttp://sche mas.dataco ntract.org /2004/07/T hreatModel ing.Interf aces"><b:V alue>No</b :Value><b: Value>Yes< /b:Value>< /a:Attribu teValues>< a:DisplayN ame>App Co ntainer Sa ndbox</a:D isplayName ><a:Inheri tance>Virt ual</a:Inh eritance>< a:Mode>Dyn amic</a:Mo de><a:Name >AppContai ner</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> No</b:Valu e><b:Value >Yes</b:Va lue></a:At tributeVal ues><a:Dis playName>J avaScript Sandbox</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>JavaScr ipt</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute><a: Attribute> <a:IsExten sion>false </a:IsExte nsion><a:A ttributeVa lues xmlns :b="http:/ /schemas.d atacontrac t.org/2004 /07/Threat Modeling.I nterfaces" ><b:Value> No</b:Valu e><b:Value >Yes</b:Va lue></a:At tributeVal ues><a:Dis playName>F lash Sandb ox</a:Disp layName><a :Inheritan ce>Virtual </a:Inheri tance><a:M ode>Dynami c</a:Mode> <a:Name>Fl ash</a:Nam e><a:Type> List</a:Ty pe></a:Att ribute></a :Attribute s><a:Avail ableToBase Models xml ns:b="http ://schemas .datacontr act.org/20 04/07/Thre atModeling .ExternalS torage.OM" /><a:Behav ior i:nil= "true"/><a :Descripti on> | |
114 | Desc ribes the types of t rust bound aries impl emented by Internet Explorer. | |
115 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.B. TMCore.IEB </a:Id><a: ImageLocat ion>Before label</a: ImageLocat ion><a:Ima geSource>i VBORw0KGgo AAAANSUhEU gAAABAAAAA QCAYAAAAf8 /9hAAAABGd BTUEAALGPC /xhBQAAAAl wSFlzAAAOx AAADsQBlSs OGwAAABl0R Vh0U29mdHd hcmUAQWRvY mUgSW1hZ2V SZWFkeXHJZ TwAAABGSUR BVDhPY/hPI WBQ9Ev6z2j qDccPnr0ES xArzoDMAeE DZy+DFRIrD jeAVDCcDID yyQajgTioA hGEQekdHx+ bGIUGeP8HA J4fIfJijo6 MAAAAAElFT kSuQmCC</a :ImageSour ce><a:Imag eStream i: nil="true" /><a:Name> Internet E xplorer Bo undaries</ a:Name><a: ParentId>G E.TB.B</a: ParentId>< a:Represen tation>Bor derBoundar y</a:Repre sentation> <a:Shape i :nil="true "/></a:Ele mentType>< a:ElementT ype><a:IsE xtension>f alse</a:Is Extension> <a:Attribu tes><a:Att ribute><a: IsExtensio n>false</a :IsExtensi on><a:Attr ibuteValue s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Inte rfaces"><b :Value>No< /b:Value>< b:Value>Ye s</b:Value ></a:Attri buteValues ><a:Displa yName>Chro me JavaScr ipt Sandbo x</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>Chr omeJava</a :Name><a:T ype>List</ a:Type></a :Attribute ><a:Attrib ute><a:IsE xtension>f alse</a:Is Extension> <a:Attribu teValues x mlns:b="ht tp://schem as.datacon tract.org/ 2004/07/Th reatModeli ng.Interfa ces"><b:Va lue>No</b: Value><b:V alue>Yes</ b:Value></ a:Attribut eValues><a :DisplayNa me>Chrome Sandbox</a :DisplayNa me><a:Inhe ritance>Vi rtual</a:I nheritance ><a:Mode>D ynamic</a: Mode><a:Na me>Chrome< /a:Name><a :Type>List </a:Type>< /a:Attribu te><a:Attr ibute><a:I sExtension >false</a: IsExtensio n><a:Attri buteValues xmlns:b=" http://sch emas.datac ontract.or g/2004/07/ ThreatMode ling.Inter faces"><b: Value>No</ b:Value><b :Value>Yes </b:Value> </a:Attrib uteValues> <a:Display Name>Firef ox JavaScr ipt Sandbo x</a:Displ ayName><a: Inheritanc e>Virtual< /a:Inherit ance><a:Mo de>Dynamic </a:Mode>< a:Name>Fir efoxJava</ a:Name><a: Type>List< /a:Type></ a:Attribut e></a:Attr ibutes><a: AvailableT oBaseModel s xmlns:b= "http://sc hemas.data contract.o rg/2004/07 /ThreatMod eling.Exte rnalStorag e.OM"/><a: Behavior i :nil="true "/><a:Desc ription> | |
116 | Desc ribes the types of t rust bound aries impl emented by Google Ch rome and F irefox. | |
117 | </a:De scription> <a:Hidden> false</a:H idden><a:I d>SE.TB.B. TMCore.Non IEB</a:Id> <a:ImageLo cation>Bef ore label< /a:ImageLo cation><a: ImageSourc e>iVBORw0K GgoAAAANSU hEUgAAABAA AAAQCAYAAA Af8/9hAAAA BGdBTUEAAL GPC/xhBQAA AAlwSFlzAA AOxAAADsQB lSsOGwAAAB l0RVh0U29m dHdhcmUAQW RvYmUgSW1h Z2VSZWFkeX HJZTwAAABG SURBVDhPY/ hPIWBQ9Ev6 z2jqDccPnr 0ESxArzoDM AeEDZy+DFR IrDjeAVDCc DIDyyQajgT ioAhGEQekd Hx+bGIUGeP 8HAJ4fIfJi jo6MAAAAAE lFTkSuQmCC </a:ImageS ource><a:I mageStream i:nil="tr ue"/><a:Na me>Other B rowsers Bo undaries</ a:Name><a: ParentId>G E.TB.B</a: ParentId>< a:Represen tation>Bor derBoundar y</a:Repre sentation> <a:Shape i :nil="true "/></a:Ele mentType>< /a:Standar dElements> <a:ThreatC ategories> <a:ThreatC ategory><a :IsExtensi on>false</ a:IsExtens ion><a:Id> S</a:Id><a :LongDescr iption/><a :Name>Spoo fing</a:Na me><a:Shor tDescripti on>Spoofin g is when a process or entity is somethi ng other t han its cl aimed iden tity. Exam ples inclu de substit uting a pr ocess, a f ile, websi te or a ne twork addr ess.</a:Sh ortDescrip tion></a:T hreatCateg ory><a:Thr eatCategor y><a:IsExt ension>fal se</a:IsEx tension><a :Id>T</a:I d><a:LongD escription /><a:Name> Tampering< /a:Name><a :ShortDesc ription>Ta mpering is the act o f altering the bits. Tampering with a pr ocess invo lves chang ing bits i n the runn ing proces s. Similar ly, Tamper ing with a data flow involves changing b its on the wire or b etween two running p rocesses.< /a:ShortDe scription> </a:Threat Category>< a:ThreatCa tegory><a: IsExtensio n>false</a :IsExtensi on><a:Id>R </a:Id><a: LongDescri ption/><a: Name>Repud iation</a: Name><a:Sh ortDescrip tion>Repud iation thr eats invol ve an adve rsary deny ing that s omething h appened.</ a:ShortDes cription>< /a:ThreatC ategory><a :ThreatCat egory><a:I sExtension >false</a: IsExtensio n><a:Id>I< /a:Id><a:L ongDescrip tion/><a:N ame>Inform ation Disc losure</a: Name><a:Sh ortDescrip tion>Infor mation dis closure ha ppens when the infor mation can be read b y an unaut horized pa rty.</a:Sh ortDescrip tion></a:T hreatCateg ory><a:Thr eatCategor y><a:IsExt ension>fal se</a:IsEx tension><a :Id>D</a:I d><a:LongD escription /><a:Name> Denial Of Service</a :Name><a:S hortDescri ption>Deni al of Serv ice happen s when the process o r a datast ore is not able to s ervice inc oming requ ests or pe rform up t o spec.</a :ShortDesc ription></ a:ThreatCa tegory><a: ThreatCate gory><a:Is Extension> false</a:I sExtension ><a:Id>E</ a:Id><a:Lo ngDescript ion/><a:Na me>Elevati on Of Priv ilege</a:N ame><a:Sho rtDescript ion>A user subject g ains incre ased capab ility or p rivilege b y taking a dvantage o f an imple mentation bug.</a:Sh ortDescrip tion></a:T hreatCateg ory><a:Thr eatCategor y><a:IsExt ension>fal se</a:IsEx tension><a :Id>A</a:I d><a:LongD escription /><a:Name> Abuse</a:N ame><a:Sho rtDescript ion>Abuse is when a legitimate user viol ates the t erms of us e for the system wit hout viola ting a sys tem securi ty policy. </a:ShortD escription ></a:Threa tCategory> </a:Threat Categories ><a:Threat MetaData>< IsPriority Used>true< /IsPriorit yUsed><IsS tatusUsed> true</IsSt atusUsed>< Properties MetaData>< ThreatMeta Datum><Nam e>Title</N ame><Label >Title</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string/ ></Values> <Id>ac0f9e a8-3b39-4c e9-bac2-67 87124d7b48 </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>User ThreatCate gory</Name ><Label>Ca tegory</La bel><HideF romUI>fals e</HideFro mUI><Value s i:nil="t rue" xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"/><Id i: nil="true" /></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatShortDe scription< /Name><Lab el>Short D escription </Label><H ideFromUI> true</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Spoofin g is when a process or entity is somethi ng other t han its cl aimed iden tity. Exam ples inclu de substit uting a pr ocess, a f ile, websi te or a ne twork addr ess.</b:st ring><b:st ring>Tampe ring is th e act of a ltering th e bits. Ta mpering wi th a proce ss involve s changing bits in t he running process. Similarly, Tampering with a da ta flow in volves cha nging bits on the wi re or betw een two ru nning proc esses.</b: string><b: string>Rep udiation t hreats inv olve an ad versary de nying that something happened. </b:string ><b:string >Informati on disclos ure happen s when the informati on can be read by an unauthori zed party. </b:string ><b:string >Denial of Service h appens whe n the proc ess or a d atastore i s not able to servic e incoming requests or perform up to spe c.</b:stri ng><b:stri ng>A user subject ga ins increa sed capabi lity or pr ivilege by taking ad vantage of an implem entation b ug.</b:str ing><b:str ing>Abuse is when a legitimate user viol ates the t erms of us e for the system wit hout viola ting a sys tem securi ty policy. </b:string ></Values> <Id>5d3b99 6b-aed5-4d 95-8cf6-61 7bb67bf042 </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>User ThreatDesc ription</N ame><Label >Descripti on</Label> <HideFromU I>false</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring/></V alues><Id> cf377f97-9 dea-42d6-a e63-b097c4 a8ec4d</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>StateInf ormation</ Name><Labe l>Justific ation</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string/> </Values>< Id>0406a68 4-e06e-464 3-ba21-0f6 3104d9131< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Inter actionStri ng</Name>< Label>Inte raction</L abel><Hide FromUI>fal se</HideFr omUI><Valu es i:nil=" true" xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"/><Id>d 64f8926-f0 9d-4d67-a8 6f-fb4ad50 36451</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >Priority< /Name><Lab el>Priorit y</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>High< /b:string> <b:string> Medium</b: string><b: string>Low </b:string ></Values> <Id>bc9c6e 2a-15d0-48 63-9cac-58 9e51e4ca1e </Id></Thr eatMetaDat um></Prope rtiesMetaD ata></a:Th reatMetaDa ta><a:Thre atTypes><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> S</a:Categ ory><a:Des cription>T hreat was migrated f rom V3.</a :Descripti on><a:Gene rationFilt ers><a:Exc lude/><a:I nclude>sou rce is 'RO OT'</a:Inc lude></a:G enerationF ilters><a: Id>SU</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Spo ofing is w hen a proc ess or ent ity is som ething oth er than it s claimed identity. Examples i nclude sub stituting a process, a file, w ebsite or a network address.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Threat was migra ted from V 3.</b:stri ng></Value s><Id>cf37 7f97-9dea- 42d6-ae63- b097c4a8ec 4d</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Pr iority</Na me><Label> Priority</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g i:nil="t rue"/></Va lues><Id>b c9c6e2a-15 d0-4863-9c ac-589e51e 4ca1e</Id> </ThreatMe taDatum></ a:Properti esMetaData ><a:Relate dCategory i:nil="tru e"/><a:Sho rtTitle>Sp oofing (v3 )</a:Short Title></a: ThreatType ><a:Threat Type><a:Is Extension> false</a:I sExtension ><a:Catego ry>S</a:Ca tegory><a: Descriptio n>{source. Name} may be spoofed by an att acker and this may l ead to una uthorized access to {target.Na me}. Consi der using a standard authentic ation mech anism to i dentify th e source p rocess.</a :Descripti on><a:Gene rationFilt ers><a:Exc lude>flow. authentica tesSource is 'Yes' o r source.i mplementsA uthenticat ionScheme is 'Yes'</ a:Exclude> <a:Include >source is 'GE.P' an d (target is 'GE.P' or target is 'GE.DS' ) and (flo w crosses 'GE.TB.L' or flow cr osses 'GE. TB.B')</a: Include></ a:Generati onFilters> <a:Id>S1</ a:Id><a:Pr opertiesMe taData><Th reatMetaDa tum><Name> UserThreat ShortDescr iption</Na me><Label> Short Desc ription</L abel><Hide FromUI>tru e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> Spoofing i s when a p rocess or entity is something other than its claim ed identit y. Example s include substituti ng a proce ss, a file , website or a netwo rk address .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>{so urce.Name} may be sp oofed by a n attacker and this may lead t o unauthor ized acces s to {targ et.Name}. Consider u sing a sta ndard auth entication mechanism to identi fy the sou rce proces s.</b:stri ng></Value s><Id>cf37 7f97-9dea- 42d6-ae63- b097c4a8ec 4d</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Pr iority</Na me><Label> Priority</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g i:nil="t rue"/></Va lues><Id>b c9c6e2a-15 d0-4863-9c ac-589e51e 4ca1e</Id> </ThreatMe taDatum></ a:Properti esMetaData ><a:Relate dCategory i:nil="tru e"/><a:Sho rtTitle>Sp oofing the {source.N ame} Proce ss</a:Shor tTitle></a :ThreatTyp e><a:Threa tType><a:I sExtension >false</a: IsExtensio n><a:Categ ory>S</a:C ategory><a :Descripti on>{target .Name} may be spoofe d by an at tacker and this may lead to in formation disclosure by {sourc e.Name}. C onsider us ing a stan dard authe ntication mechanism to identif y the dest ination pr ocess.</a: Descriptio n><a:Gener ationFilte rs><a:Excl ude>flow.a uthenticat esDestinat ion is 'Ye s'</a:Excl ude><a:Inc lude>(sour ce is 'GE. P' or sour ce is 'GE. EI' or sou rce is 'GE .DS') and target is 'GE.P' and (flow cro sses 'GE.T B.L' or fl ow crosses 'GE.TB.B' )</a:Inclu de></a:Gen erationFil ters><a:Id >S2</a:Id> <a:Propert iesMetaDat a><ThreatM etaDatum>< Name>UserT hreatShort Descriptio n</Name><L abel>Short Descripti on</Label> <HideFromU I>true</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>Spoof ing is whe n a proces s or entit y is somet hing other than its claimed id entity. Ex amples inc lude subst ituting a process, a file, web site or a network ad dress.</b: string></V alues><Id> 5d3b996b-a ed5-4d95-8 cf6-617bb6 7bf042</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>UserThre atDescript ion</Name> <Label>Des cription</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>{target. Name} may be spoofed by an att acker and this may l ead to inf ormation d isclosure by {source .Name}. Co nsider usi ng a stand ard authen tication m echanism t o identify the desti nation pro cess.</b:s tring></Va lues><Id>c f377f97-9d ea-42d6-ae 63-b097c4a 8ec4d</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >Priority< /Name><Lab el>Priorit y</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring i:nil ="true"/>< /Values><I d>bc9c6e2a -15d0-4863 -9cac-589e 51e4ca1e</ Id></Threa tMetaDatum ></a:Prope rtiesMetaD ata><a:Rel atedCatego ry i:nil=" true"/><a: ShortTitle >Spoofing the {targe t.Name} Pr ocess</a:S hortTitle> </a:Threat Type><a:Th reatType>< a:IsExtens ion>false< /a:IsExten sion><a:Ca tegory>S</ a:Category ><a:Descri ption>{sou rce.Name} may be spo ofed by an attacker and this m ay lead to unauthori zed access to {targe t.Name}. C onsider us ing a stan dard authe ntication mechanism to identif y the exte rnal entit y.</a:Desc ription><a :Generatio nFilters>< a:Exclude> source.aut henticates Itself is 'Yes' or f low.authen ticatesSou rce is 'Ye s'</a:Excl ude><a:Inc lude>sourc e is 'GE.E I' and tar get is 'GE .P'</a:Inc lude></a:G enerationF ilters><a: Id>S3</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Spo ofing is w hen a proc ess or ent ity is som ething oth er than it s claimed identity. Examples i nclude sub stituting a process, a file, w ebsite or a network address.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>{sourc e.Name} ma y be spoof ed by an a ttacker an d this may lead to u nauthorize d access t o {target. Name}. Con sider usin g a standa rd authent ication me chanism to identify the extern al entity. </b:string ></Values> <Id>cf377f 97-9dea-42 d6-ae63-b0 97c4a8ec4d </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>Prio rity</Name ><Label>Pr iority</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string i:nil="tru e"/></Valu es><Id>bc9 c6e2a-15d0 -4863-9cac -589e51e4c a1e</Id></ ThreatMeta Datum></a: Properties MetaData>< a:RelatedC ategory i: nil="true" /><a:Short Title>Spoo fing the { source.Nam e} Externa l Entity</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> S</a:Categ ory><a:Des cription>{ source.Nam e} may be spoofed by an attack er and thi s may lead to incorr ect data d elivered t o {target. Name}. Con sider usin g a standa rd authent ication me chanism to identify the source data stor e.</a:Desc ription><a :Generatio nFilters>< a:Exclude/ ><a:Includ e>source i s 'GE.DS'< /a:Include ></a:Gener ationFilte rs><a:Id>S 7</a:Id><a :Propertie sMetaData> <ThreatMet aDatum><Na me>UserThr eatShortDe scription< /Name><Lab el>Short D escription </Label><H ideFromUI> true</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Spoofin g is when a process or entity is somethi ng other t han its cl aimed iden tity. Exam ples inclu de substit uting a pr ocess, a f ile, websi te or a ne twork addr ess.</b:st ring></Val ues><Id>5d 3b996b-aed 5-4d95-8cf 6-617bb67b f042</Id>< /ThreatMet aDatum><Th reatMetaDa tum><Name> UserThreat Descriptio n</Name><L abel>Descr iption</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> {source.Na me} may be spoofed b y an attac ker and th is may lea d to incor rect data delivered to {target .Name}. Co nsider usi ng a stand ard authen tication m echanism t o identify the sourc e data sto re.</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>S poofing of Source Da ta Store { source.Nam e}</a:Shor tTitle></a :ThreatTyp e><a:Threa tType><a:I sExtension >false</a: IsExtensio n><a:Categ ory>S</a:C ategory><a :Descripti on>{target .Name} may be spoofe d by an at tacker and this may lead to da ta being w ritten to the attack er's targe t instead of {target .Name}. Co nsider usi ng a stand ard authen tication m echanism t o identify the desti nation dat a store.</ a:Descript ion><a:Gen erationFil ters><a:Ex clude/><a: Include>ta rget is 'G E.DS'</a:I nclude></a :Generatio nFilters>< a:Id>S7.1< /a:Id><a:P ropertiesM etaData><T hreatMetaD atum><Name >UserThrea tShortDesc ription</N ame><Label >Short Des cription</ Label><Hid eFromUI>tr ue</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string >Spoofing is when a process or entity is something other tha n its clai med identi ty. Exampl es include substitut ing a proc ess, a fil e, website or a netw ork addres s.</b:stri ng></Value s><Id>5d3b 996b-aed5- 4d95-8cf6- 617bb67bf0 42</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Us erThreatDe scription< /Name><Lab el>Descrip tion</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string>{t arget.Name } may be s poofed by an attacke r and this may lead to data be ing writte n to the a ttacker's target ins tead of {t arget.Name }. Conside r using a standard a uthenticat ion mechan ism to ide ntify the destinatio n data sto re.</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>S poofing of Destinati on Data St ore {targe t.Name}</a :ShortTitl e></a:Thre atType><a: ThreatType ><a:IsExte nsion>fals e</a:IsExt ension><a: Category>S </a:Catego ry><a:Desc ription>{t arget.Name } may be s poofed by an attacke r and this may lead to data be ing sent t o the atta cker's tar get instea d of {targ et.Name}. Consider u sing a sta ndard auth entication mechanism to identi fy the ext ernal enti ty.</a:Des cription>< a:Generati onFilters> <a:Exclude /><a:Inclu de>source is 'GE.P' and target is 'GE.EI ' and (flo w crosses 'GE.TB.L' or flow cr osses 'GE. TB.B')</a: Include></ a:Generati onFilters> <a:Id>S8</ a:Id><a:Pr opertiesMe taData><Th reatMetaDa tum><Name> UserThreat ShortDescr iption</Na me><Label> Short Desc ription</L abel><Hide FromUI>tru e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> Spoofing i s when a p rocess or entity is something other than its claim ed identit y. Example s include substituti ng a proce ss, a file , website or a netwo rk address .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>{ta rget.Name} may be sp oofed by a n attacker and this may lead t o data bei ng sent to the attac ker's targ et instead of {targe t.Name}. C onsider us ing a stan dard authe ntication mechanism to identif y the exte rnal entit y.</b:stri ng></Value s><Id>cf37 7f97-9dea- 42d6-ae63- b097c4a8ec 4d</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Pr iority</Na me><Label> Priority</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g i:nil="t rue"/></Va lues><Id>b c9c6e2a-15 d0-4863-9c ac-589e51e 4ca1e</Id> </ThreatMe taDatum></ a:Properti esMetaData ><a:Relate dCategory i:nil="tru e"/><a:Sho rtTitle>Sp oofing of the {targe t.Name} Ex ternal Des tination E ntity</a:S hortTitle> </a:Threat Type><a:Th reatType>< a:IsExtens ion>false< /a:IsExten sion><a:Ca tegory>T</ a:Category ><a:Descri ption>Thre at was mig rated from V3.</a:De scription> <a:Generat ionFilters ><a:Exclud e/><a:Incl ude>source is 'ROOT' </a:Includ e></a:Gene rationFilt ers><a:Id> TU</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Tamper ing is the act of al tering the bits. Tam pering wit h a proces s involves changing bits in th e running process. S imilarly, Tampering with a dat a flow inv olves chan ging bits on the wir e or betwe en two run ning proce sses.</b:s tring></Va lues><Id>5 d3b996b-ae d5-4d95-8c f6-617bb67 bf042</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >UserThrea tDescripti on</Name>< Label>Desc ription</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string >Threat wa s migrated from V3.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>Tampe ring (v3)< /a:ShortTi tle></a:Th reatType>< a:ThreatTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Category >T</a:Cate gory><a:De scription> Data flowi ng across {flow.Name } may be t ampered wi th by an a ttacker. T his may le ad to a de nial of se rvice atta ck against {target.N ame} or an elevation of privil ege attack against { target.Nam e} or an i nformation disclosur e by {targ et.Name}. Failure to verify th at input i s as expec ted is a r oot cause of a very large numb er of expl oitable is sues. Cons ider all p aths and t he way the y handle d ata. Verif y that all input is verified f or correct ness using an approv ed list in put valida tion appro ach.</a:De scription> <a:Generat ionFilters ><a:Exclud e>(flow.pr ovidesConf identialit y is 'Yes' and flow. providesIn tegrity is 'Yes')</a :Exclude>< a:Include> (source is 'GE.P' or source is 'GE.EI') and target is 'GE.P' and (flow crosses ' GE.TB.L' o r flow cro sses 'GE.T B.B')</a:I nclude></a :Generatio nFilters>< a:Id>T1</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>T ampering i s the act of alterin g the bits . Tamperin g with a p rocess inv olves chan ging bits in the run ning proce ss. Simila rly, Tampe ring with a data flo w involves changing bits on th e wire or between tw o running processes. </b:string ></Values> <Id>5d3b99 6b-aed5-4d 95-8cf6-61 7bb67bf042 </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>User ThreatDesc ription</N ame><Label >Descripti on</Label> <HideFromU I>false</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring>Data flowing a cross {flo w.Name} ma y be tampe red with b y an attac ker. This may lead t o a denial of servic e attack a gainst {ta rget.Name} or an ele vation of privilege attack aga inst {targ et.Name} o r an infor mation dis closure by {target.N ame}. Fail ure to ver ify that i nput is as expected is a root cause of a very larg e number o f exploita ble issues . Consider all paths and the w ay they ha ndle data. Verify th at all inp ut is veri fied for c orrectness using an approved l ist input validation approach. </b:string ></Values> <Id>cf377f 97-9dea-42 d6-ae63-b0 97c4a8ec4d </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>Prio rity</Name ><Label>Pr iority</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string i:nil="tru e"/></Valu es><Id>bc9 c6e2a-15d0 -4863-9cac -589e51e4c a1e</Id></ ThreatMeta Datum></a: Properties MetaData>< a:RelatedC ategory i: nil="true" /><a:Short Title>Pote ntial Lack of Input Validation for {targ et.Name}</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> T</a:Categ ory><a:Des cription>I f {source. Name} is g iven acces s to memor y, such as shared me mory or po inters, or is given the abilit y to contr ol what {t arget.Name } executes (for exam ple, passi ng back a function p ointer.), then {sour ce.Name} c an tamper with {targ et.Name}. Consider i f the func tion could work with less acce ss to memo ry, such a s passing data rathe r than poi nters. Cop y in data provided, and then v alidate it .</a:Descr iption><a: Generation Filters><a :Exclude/> <a:Include >source is 'GE.P' an d target i s 'GE.P' a nd target. codeType i s 'Unmanag ed'</a:Inc lude></a:G enerationF ilters><a: Id>T2</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Tam pering is the act of altering the bits. Tampering with a pro cess invol ves changi ng bits in the runni ng process . Similarl y, Tamperi ng with a data flow involves c hanging bi ts on the wire or be tween two running pr ocesses.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>If {so urce.Name} is given access to memory, su ch as shar ed memory or pointer s, or is g iven the a bility to control wh at {target .Name} exe cutes (for example, passing ba ck a funct ion pointe r.), then {source.Na me} can ta mper with {target.Na me}. Consi der if the function could work with less access to memory, s uch as pas sing data rather tha n pointers . Copy in data provi ded, and t hen valida te it.</b: string></V alues><Id> cf377f97-9 dea-42d6-a e63-b097c4 a8ec4d</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>Priority </Name><La bel>Priori ty</Label> <HideFromU I>false</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring i:ni l="true"/> </Values>< Id>bc9c6e2 a-15d0-486 3-9cac-589 e51e4ca1e< /Id></Thre atMetaDatu m></a:Prop ertiesMeta Data><a:Re latedCateg ory i:nil= "true"/><a :ShortTitl e>{source. Name} Proc ess Memory Tampered< /a:ShortTi tle></a:Th reatType>< a:ThreatTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Category >T</a:Cate gory><a:De scription> Packets or messages without se quence num bers or ti mestamps c an be capt ured and r eplayed in a wide va riety of w ays. Imple ment or ut ilize an e xisting co mmunicatio n protocol that supp orts anti- replay tec hniques (i nvestigate sequence numbers be fore timer s) and str ong integr ity.</a:De scription> <a:Generat ionFilters ><a:Exclud e/><a:Incl ude>source is 'GE.P' and targe t is 'GE.P ' and sour ce.impleme ntsCommuni cationProt ocol is 'Y es'</a:Inc lude></a:G enerationF ilters><a: Id>T3</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Tam pering is the act of altering the bits. Tampering with a pro cess invol ves changi ng bits in the runni ng process . Similarl y, Tamperi ng with a data flow involves c hanging bi ts on the wire or be tween two running pr ocesses.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Packet s or messa ges withou t sequence numbers o r timestam ps can be captured a nd replaye d in a wid e variety of ways. I mplement o r utilize an existin g communic ation prot ocol that supports a nti-replay technique s (investi gate seque nce number s before t imers) and strong in tegrity.</ b:string>< /Values><I d>cf377f97 -9dea-42d6 -ae63-b097 c4a8ec4d</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>Priori ty</Name>< Label>Prio rity</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string i: nil="true" /></Values ><Id>bc9c6 e2a-15d0-4 863-9cac-5 89e51e4ca1 e</Id></Th reatMetaDa tum></a:Pr opertiesMe taData><a: RelatedCat egory i:ni l="true"/> <a:ShortTi tle>Replay Attacks</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> T</a:Categ ory><a:Des cription>A ttackers w ho can sen d a series of packet s or messa ges may be able to o verlap dat a. For exa mple, pack et 1 may b e 100 byte s starting at offset 0. Packet 2 may be 100 bytes starting a t offset 2 5. Packet 2 will ove rwrite 75 bytes of p acket 1. E nsure you reassemble data befo re filteri ng it, and ensure yo u explicit ly handle these sort s of cases .</a:Descr iption><a: Generation Filters><a :Exclude/> <a:Include >source is 'GE.P' an d target i s 'GE.P' a nd source. implements Communicat ionProtoco l is 'Yes' </a:Includ e></a:Gene rationFilt ers><a:Id> T4</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Tamper ing is the act of al tering the bits. Tam pering wit h a proces s involves changing bits in th e running process. S imilarly, Tampering with a dat a flow inv olves chan ging bits on the wir e or betwe en two run ning proce sses.</b:s tring></Va lues><Id>5 d3b996b-ae d5-4d95-8c f6-617bb67 bf042</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >UserThrea tDescripti on</Name>< Label>Desc ription</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string >Attackers who can s end a seri es of pack ets or mes sages may be able to overlap d ata. For e xample, pa cket 1 may be 100 by tes starti ng at offs et 0. Pack et 2 may b e 100 byte s starting at offset 25. Packe t 2 will o verwrite 7 5 bytes of packet 1. Ensure yo u reassemb le data be fore filte ring it, a nd ensure you explic itly handl e these so rts of cas es.</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>C ollision A ttacks</a: ShortTitle ></a:Threa tType><a:T hreatType> <a:IsExten sion>false </a:IsExte nsion><a:C ategory>T< /a:Categor y><a:Descr iption>Log readers c an come un der attack via log f iles. Cons ider ways to canonic alize data in all lo gs. Implem ent a sing le reader for the lo gs, if pos sible, in order to r educe atta ck surface area. Be sure to un derstand a nd documen t log file elements which come from untr usted sour ces.</a:De scription> <a:Generat ionFilters ><a:Exclud e/><a:Incl ude>(sourc e is 'GE.P ' and targ et is 'GE. DS' and ta rget.store sLogData i s 'Yes') o r (target is 'GE.P' and source is 'GE.DS ' and sour ce.storesL ogData is 'Yes')</a: Include></ a:Generati onFilters> <a:Id>T5</ a:Id><a:Pr opertiesMe taData><Th reatMetaDa tum><Name> UserThreat ShortDescr iption</Na me><Label> Short Desc ription</L abel><Hide FromUI>tru e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> Tampering is the act of alteri ng the bit s. Tamperi ng with a process in volves cha nging bits in the ru nning proc ess. Simil arly, Tamp ering with a data fl ow involve s changing bits on t he wire or between t wo running processes .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Log readers c an come un der attack via log f iles. Cons ider ways to canonic alize data in all lo gs. Implem ent a sing le reader for the lo gs, if pos sible, in order to r educe atta ck surface area. Be sure to un derstand a nd documen t log file elements which come from untr usted sour ces.</b:st ring></Val ues><Id>cf 377f97-9de a-42d6-ae6 3-b097c4a8 ec4d</Id>< /ThreatMet aDatum><Th reatMetaDa tum><Name> Priority</ Name><Labe l>Priority </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing i:nil= "true"/></ Values><Id >bc9c6e2a- 15d0-4863- 9cac-589e5 1e4ca1e</I d></Threat MetaDatum> </a:Proper tiesMetaDa ta><a:Rela tedCategor y i:nil="t rue"/><a:S hortTitle> Risks from Logging</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> T</a:Categ ory><a:Des cription>A n attacker can read or modify data trans mitted ove r an authe nticated d ataflow.</ a:Descript ion><a:Gen erationFil ters><a:Ex clude>(flo w.provides Confidenti ality is ' Yes' and f low.provid esIntegrit y is 'Yes' )</a:Exclu de><a:Incl ude>(flow. authentica tesSource is 'Yes' o r flow.aut henticates Destinatio n is 'Yes' )</a:Inclu de></a:Gen erationFil ters><a:Id >T6</a:Id> <a:Propert iesMetaDat a><ThreatM etaDatum>< Name>UserT hreatShort Descriptio n</Name><L abel>Short Descripti on</Label> <HideFromU I>true</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>Tampe ring is th e act of a ltering th e bits. Ta mpering wi th a proce ss involve s changing bits in t he running process. Similarly, Tampering with a da ta flow in volves cha nging bits on the wi re or betw een two ru nning proc esses.</b: string></V alues><Id> 5d3b996b-a ed5-4d95-8 cf6-617bb6 7bf042</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>UserThre atDescript ion</Name> <Label>Des cription</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>An attac ker can re ad or modi fy data tr ansmitted over an au thenticate d dataflow .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Aut henticated Data Flow Compromis ed</a:Shor tTitle></a :ThreatTyp e><a:Threa tType><a:I sExtension >false</a: IsExtensio n><a:Categ ory>T</a:C ategory><a :Descripti on>SQL inj ection is an attack in which m alicious c ode is ins erted into strings t hat are la ter passed to an ins tance of S QL Server for parsin g and exec ution. Any procedure that cons tructs SQL statement s should b e reviewed for injec tion vulne rabilities because S QL Server will execu te all syn tactically valid que ries that it receive s. Even pa rameterize d data can be manipu lated by a skilled a nd determi ned attack er.</a:Des cription>< a:Generati onFilters> <a:Exclude /><a:Inclu de> | |
118 | (t arget is ' SE.DS.TMCo re.SQL' an d source i s 'GE.P') | |
119 | </a: Include></ a:Generati onFilters> <a:Id>T7</ a:Id><a:Pr opertiesMe taData><Th reatMetaDa tum><Name> UserThreat ShortDescr iption</Na me><Label> Short Desc ription</L abel><Hide FromUI>tru e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> Tampering is the act of alteri ng the bit s. Tamperi ng with a process in volves cha nging bits in the ru nning proc ess. Simil arly, Tamp ering with a data fl ow involve s changing bits on t he wire or between t wo running processes .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>SQL injection is an att ack in whi ch malicio us code is inserted into strin gs that ar e later pa ssed to an instance of SQL Ser ver for pa rsing and execution. Any proce dure that constructs SQL state ments shou ld be revi ewed for i njection v ulnerabili ties becau se SQL Ser ver will e xecute all syntactic ally valid queries t hat it rec eives. Eve n paramete rized data can be ma nipulated by a skill ed and det ermined at tacker.</b :string></ Values><Id >cf377f97- 9dea-42d6- ae63-b097c 4a8ec4d</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>Priorit y</Name><L abel>Prior ity</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string i:n il="true"/ ></Values> <Id>bc9c6e 2a-15d0-48 63-9cac-58 9e51e4ca1e </Id></Thr eatMetaDat um></a:Pro pertiesMet aData><a:R elatedCate gory i:nil ="true"/>< a:ShortTit le>Potenti al SQL Inj ection Vul nerability for {targ et.Name}</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> T</a:Categ ory><a:Des cription>S QL injecti on is an a ttack in w hich malic ious code is inserte d into str ings that are later passed to an instanc e of SQL S erver for parsing an d executio n. Any pro cedure tha t construc ts SQL sta tements sh ould be re viewed for injection vulnerabi lities bec ause SQL S erver will execute a ll syntact ically val id queries that it r eceives. E ven parame terized da ta can be manipulate d by a ski lled and d etermined attacker.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include> | |
120 | (t arget is ' SE.DS.TMCo re.SQL' an d source i s 'GE.EI') | |
121 | </a: Include></ a:Generati onFilters> <a:Id>T8</ a:Id><a:Pr opertiesMe taData><Th reatMetaDa tum><Name> UserThreat ShortDescr iption</Na me><Label> Short Desc ription</L abel><Hide FromUI>tru e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> Tampering is the act of alteri ng the bit s. Tamperi ng with a process in volves cha nging bits in the ru nning proc ess. Simil arly, Tamp ering with a data fl ow involve s changing bits on t he wire or between t wo running processes .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>SQL injection is an att ack in whi ch malicio us code is inserted into strin gs that ar e later pa ssed to an instance of SQL Ser ver for pa rsing and execution. Any proce dure that constructs SQL state ments shou ld be revi ewed for i njection v ulnerabili ties becau se SQL Ser ver will e xecute all syntactic ally valid queries t hat it rec eives. Eve n paramete rized data can be ma nipulated by a skill ed and det ermined at tacker.</b :string></ Values><Id >cf377f97- 9dea-42d6- ae63-b097c 4a8ec4d</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>Priorit y</Name><L abel>Prior ity</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string i:n il="true"/ ></Values> <Id>bc9c6e 2a-15d0-48 63-9cac-58 9e51e4ca1e </Id></Thr eatMetaDat um></a:Pro pertiesMet aData><a:R elatedCate gory i:nil ="true"/>< a:ShortTit le>Possibl e SQL Inje ction Vuln erability for {targe t.Name}</a :ShortTitl e></a:Thre atType><a: ThreatType ><a:IsExte nsion>fals e</a:IsExt ension><a: Category>T </a:Catego ry><a:Desc ription>If a dataflo w contains XML, XML processing threats ( DTD and XS LT code ex ecution) m ay be expl oited.</a: Descriptio n><a:Gener ationFilte rs><a:Excl ude/><a:In clude>(flo w.XMLenc i s 'Yes' an d target i s 'GE.P')< /a:Include ></a:Gener ationFilte rs><a:Id>T 11</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Tamper ing is the act of al tering the bits. Tam pering wit h a proces s involves changing bits in th e running process. S imilarly, Tampering with a dat a flow inv olves chan ging bits on the wir e or betwe en two run ning proce sses.</b:s tring></Va lues><Id>5 d3b996b-ae d5-4d95-8c f6-617bb67 bf042</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >UserThrea tDescripti on</Name>< Label>Desc ription</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string >If a data flow conta ins XML, X ML process ing threat s (DTD and XSLT code execution ) may be e xploited.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>XML D TD and XSL T Processi ng</a:Shor tTitle></a :ThreatTyp e><a:Threa tType><a:I sExtension >false</a: IsExtensio n><a:Categ ory>T</a:C ategory><a :Descripti on>If a da taflow con tains JSON , JSON pro cessing an d hijackin g threats may be exp loited.</a :Descripti on><a:Gene rationFilt ers><a:Exc lude/><a:I nclude>((f low is 'SE .DF.TMCore .HTTP' or flow is 'S E.DF.TMCor e.HTTPS') and flow.J SON is 'Ye s' and tar get is 'GE .P')</a:In clude></a: Generation Filters><a :Id>T12</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>T ampering i s the act of alterin g the bits . Tamperin g with a p rocess inv olves chan ging bits in the run ning proce ss. Simila rly, Tampe ring with a data flo w involves changing bits on th e wire or between tw o running processes. </b:string ></Values> <Id>5d3b99 6b-aed5-4d 95-8cf6-61 7bb67bf042 </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>User ThreatDesc ription</N ame><Label >Descripti on</Label> <HideFromU I>false</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring>If a dataflow contains J SON, JSON processing and hijac king threa ts may be exploited. </b:string ></Values> <Id>cf377f 97-9dea-42 d6-ae63-b0 97c4a8ec4d </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>Prio rity</Name ><Label>Pr iority</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string i:nil="tru e"/></Valu es><Id>bc9 c6e2a-15d0 -4863-9cac -589e51e4c a1e</Id></ ThreatMeta Datum></a: Properties MetaData>< a:RelatedC ategory i: nil="true" /><a:Short Title>Java Script Obj ect Notati on Process ing</a:Sho rtTitle></ a:ThreatTy pe><a:Thre atType><a: IsExtensio n>false</a :IsExtensi on><a:Cate gory>T</a: Category>< a:Descript ion>The we b server ' {target.Na me}' could be a subj ect to a c ross-site scripting attack bec ause it do es not san itize untr usted inpu t.</a:Desc ription><a :Generatio nFilters>< a:Exclude> (target.ha sOutputSan itizers is 'Yes') an d (target. hasInputSa nitizers i s 'Yes')</ a:Exclude> <a:Include >(target i s 'SE.P.TM Core.WebSe rver' or t arget is ' SE.P.TMCor e.WebApp') </a:Includ e></a:Gene rationFilt ers><a:Id> T13.1</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Tam pering is the act of altering the bits. Tampering with a pro cess invol ves changi ng bits in the runni ng process . Similarl y, Tamperi ng with a data flow involves c hanging bi ts on the wire or be tween two running pr ocesses.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>The we b server ' {target.Na me}' could be a subj ect to a c ross-site scripting attack bec ause it do es not san itize untr usted inpu t.</b:stri ng></Value s><Id>cf37 7f97-9dea- 42d6-ae63- b097c4a8ec 4d</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Pr iority</Na me><Label> Priority</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g i:nil="t rue"/></Va lues><Id>b c9c6e2a-15 d0-4863-9c ac-589e51e 4ca1e</Id> </ThreatMe taDatum></ a:Properti esMetaData ><a:Relate dCategory i:nil="tru e"/><a:Sho rtTitle>Cr oss Site S cripting</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> T</a:Categ ory><a:Des cription>T he web ser ver '{targ et.Name}' could be a subject t o a persis tent cross -site scri pting atta ck because it does n ot sanitiz e data sto re '{sourc e.Name}' i nputs and output.</a :Descripti on><a:Gene rationFilt ers><a:Exc lude>(targ et.hasOutp utSanitize rs is 'Yes ') and (ta rget.hasIn putSanitiz ers is 'Ye s')</a:Exc lude><a:In clude>(tar get is 'SE .P.TMCore. WebServer' or target is 'SE.P. TMCore.Web App') and source is 'GE.DS'</a :Include>< /a:Generat ionFilters ><a:Id>T13 .2</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Tamper ing is the act of al tering the bits. Tam pering wit h a proces s involves changing bits in th e running process. S imilarly, Tampering with a dat a flow inv olves chan ging bits on the wir e or betwe en two run ning proce sses.</b:s tring></Va lues><Id>5 d3b996b-ae d5-4d95-8c f6-617bb67 bf042</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >UserThrea tDescripti on</Name>< Label>Desc ription</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string >The web s erver '{ta rget.Name} ' could be a subject to a pers istent cro ss-site sc ripting at tack becau se it does not sanit ize data s tore '{sou rce.Name}' inputs an d output.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>Persi stent Cros s Site Scr ipting</a: ShortTitle ></a:Threa tType><a:T hreatType> <a:IsExten sion>false </a:IsExte nsion><a:C ategory>T< /a:Categor y><a:Descr iption>Dat a flowing across {fl ow.Name} m ay be tamp ered with by an atta cker. This may lead to corrupt ion of {ta rget.Name} . Ensure t he integri ty of the data flow to the dat a store.</ a:Descript ion><a:Gen erationFil ters><a:Ex clude/><a: Include>(s ource is ' GE.P' or s ource is ' GE.EI') an d target i s 'GE.DS' and (flow crosses 'G E.TB.L' or flow cros ses 'GE.TB .B')</a:In clude></a: Generation Filters><a :Id>T18</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>T ampering i s the act of alterin g the bits . Tamperin g with a p rocess inv olves chan ging bits in the run ning proce ss. Simila rly, Tampe ring with a data flo w involves changing bits on th e wire or between tw o running processes. </b:string ></Values> <Id>5d3b99 6b-aed5-4d 95-8cf6-61 7bb67bf042 </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>User ThreatDesc ription</N ame><Label >Descripti on</Label> <HideFromU I>false</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring>Data flowing a cross {flo w.Name} ma y be tampe red with b y an attac ker. This may lead t o corrupti on of {tar get.Name}. Ensure th e integrit y of the d ata flow t o the data store.</b :string></ Values><Id >cf377f97- 9dea-42d6- ae63-b097c 4a8ec4d</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>Priorit y</Name><L abel>Prior ity</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string i:n il="true"/ ></Values> <Id>bc9c6e 2a-15d0-48 63-9cac-58 9e51e4ca1e </Id></Thr eatMetaDat um></a:Pro pertiesMet aData><a:R elatedCate gory i:nil ="true"/>< a:ShortTit le>The {ta rget.Name} Data Stor e Could Be Corrupted </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>R</a:Cat egory><a:D escription >Threat wa s migrated from V3.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include>s ource is ' ROOT'</a:I nclude></a :Generatio nFilters>< a:Id>RU</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>R epudiation threats i nvolve an adversary denying th at somethi ng happene d.</b:stri ng></Value s><Id>5d3b 996b-aed5- 4d95-8cf6- 617bb67bf0 42</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Us erThreatDe scription< /Name><Lab el>Descrip tion</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string>Th reat was m igrated fr om V3.</b: string></V alues><Id> cf377f97-9 dea-42d6-a e63-b097c4 a8ec4d</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>Priority </Name><La bel>Priori ty</Label> <HideFromU I>false</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring i:ni l="true"/> </Values>< Id>bc9c6e2 a-15d0-486 3-9cac-589 e51e4ca1e< /Id></Thre atMetaDatu m></a:Prop ertiesMeta Data><a:Re latedCateg ory i:nil= "true"/><a :ShortTitl e>Repudiat ion (v3)</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> R</a:Categ ory><a:Des cription>I f you have trust lev els, is an yone other outside o f the high est trust level allo wed to log ? Letting everyone w rite to yo ur logs ca n lead to repudiatio n problems . Only all ow trusted code to l og.</a:Des cription>< a:Generati onFilters> <a:Exclude /><a:Inclu de>(source is 'GE.P' or source is 'GE.EI ') and (ta rget is 'G E.DS') and (target.s toresLogDa ta is 'Yes ')</a:Incl ude></a:Ge nerationFi lters><a:I d>R1</a:Id ><a:Proper tiesMetaDa ta><Threat MetaDatum> <Name>User ThreatShor tDescripti on</Name>< Label>Shor t Descript ion</Label ><HideFrom UI>true</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring>Repu diation th reats invo lve an adv ersary den ying that something happened.< /b:string> </Values>< Id>5d3b996 b-aed5-4d9 5-8cf6-617 bb67bf042< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>UserT hreatDescr iption</Na me><Label> Descriptio n</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>If yo u have tru st levels, is anyone other out side of th e highest trust leve l allowed to log? Le tting ever yone write to your l ogs can le ad to repu diation pr oblems. On ly allow t rusted cod e to log.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>Lower Trusted S ubject Upd ates Logs< /a:ShortTi tle></a:Th reatType>< a:ThreatTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Category >R</a:Cate gory><a:De scription> Do you acc ept logs f rom unknow n or weakl y authenti cated user s or syste ms? Identi fy and aut henticate the source of the lo gs before accepting them.</a:D escription ><a:Genera tionFilter s><a:Exclu de/><a:Inc lude>(sour ce is 'GE. P' or sour ce is 'GE. EI') and ( target is 'GE.DS') a nd (target .storesLog Data is 'Y es')</a:In clude></a: Generation Filters><a :Id>R2</a: Id><a:Prop ertiesMeta Data><Thre atMetaDatu m><Name>Us erThreatSh ortDescrip tion</Name ><Label>Sh ort Descri ption</Lab el><HideFr omUI>true< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string>Re pudiation threats in volve an a dversary d enying tha t somethin g happened .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Do you accept logs from unknown o r weakly a uthenticat ed users o r systems? Identify and authen ticate the source of the logs before acc epting the m.</b:stri ng></Value s><Id>cf37 7f97-9dea- 42d6-ae63- b097c4a8ec 4d</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Pr iority</Na me><Label> Priority</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g i:nil="t rue"/></Va lues><Id>b c9c6e2a-15 d0-4863-9c ac-589e51e 4ca1e</Id> </ThreatMe taDatum></ a:Properti esMetaData ><a:Relate dCategory i:nil="tru e"/><a:Sho rtTitle>Da ta Logs fr om an Unkn own Source </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>R</a:Cat egory><a:D escription >Does the log captur e enough d ata to und erstand wh at happene d in the p ast? Do yo ur logs ca pture enou gh data to understan d an incid ent after the fact? Is such ca pture ligh tweight en ough to be left on a ll the tim e? Do you have enoug h data to deal with repudiatio n claims? Make sure you log su fficient a nd appropr iate data to handle a repudiat ion claims . You migh t want to talk to an audit exp ert as wel l as a pri vacy exper t about yo ur choice of data.</ a:Descript ion><a:Gen erationFil ters><a:Ex clude/><a: Include>so urce is 'G E.P' and t arget is ' GE.DS' and target.st oresLogDat a is 'Yes' </a:Includ e></a:Gene rationFilt ers><a:Id> R3</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Repudi ation thre ats involv e an adver sary denyi ng that so mething ha ppened.</b :string></ Values><Id >5d3b996b- aed5-4d95- 8cf6-617bb 67bf042</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatDescrip tion</Name ><Label>De scription< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Does th e log capt ure enough data to u nderstand what happe ned in the past? Do your logs capture en ough data to underst and an inc ident afte r the fact ? Is such capture li ghtweight enough to be left on all the t ime? Do yo u have eno ugh data t o deal wit h repudiat ion claims ? Make sur e you log sufficient and appro priate dat a to handl e a repudi ation clai ms. You mi ght want t o talk to an audit e xpert as w ell as a p rivacy exp ert about your choic e of data. </b:string ></Values> <Id>cf377f 97-9dea-42 d6-ae63-b0 97c4a8ec4d </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>Prio rity</Name ><Label>Pr iority</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string i:nil="tru e"/></Valu es><Id>bc9 c6e2a-15d0 -4863-9cac -589e51e4c a1e</Id></ ThreatMeta Datum></a: Properties MetaData>< a:RelatedC ategory i: nil="true" /><a:Short Title>Insu fficient A uditing</a :ShortTitl e></a:Thre atType><a: ThreatType ><a:IsExte nsion>fals e</a:IsExt ension><a: Category>R </a:Catego ry><a:Desc ription>Co nsider wha t happens when the a udit mecha nism comes under att ack, inclu ding attem pts to des troy the l ogs, or at tack log a nalysis pr ograms. En sure acces s to the l og is thro ugh a refe rence moni tor, which controls read and w rite separ ately. Doc ument what filters, if any, re aders can rely on, o r writers should exp ect</a:Des cription>< a:Generati onFilters> <a:Exclude /><a:Inclu de>source is 'GE.P' and target is 'GE.DS ' and targ et.storesL ogData is 'Yes'</a:I nclude></a :Generatio nFilters>< a:Id>R4</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>R epudiation threats i nvolve an adversary denying th at somethi ng happene d.</b:stri ng></Value s><Id>5d3b 996b-aed5- 4d95-8cf6- 617bb67bf0 42</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Us erThreatDe scription< /Name><Lab el>Descrip tion</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string>Co nsider wha t happens when the a udit mecha nism comes under att ack, inclu ding attem pts to des troy the l ogs, or at tack log a nalysis pr ograms. En sure acces s to the l og is thro ugh a refe rence moni tor, which controls read and w rite separ ately. Doc ument what filters, if any, re aders can rely on, o r writers should exp ect</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>P otential W eak Protec tions for Audit Data </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>R</a:Cat egory><a:D escription >{target.N ame} claim s that it did not re ceive data from a so urce outsi de the tru st boundar y. Conside r using lo gging or a uditing to record th e source, time, and summary of the recei ved data.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include>t arget is ' GE.P' and (flow cros ses 'GE.TB .L' or flo w crosses 'GE.TB.B') </a:Includ e></a:Gene rationFilt ers><a:Id> R6</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Repudi ation thre ats involv e an adver sary denyi ng that so mething ha ppened.</b :string></ Values><Id >5d3b996b- aed5-4d95- 8cf6-617bb 67bf042</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatDescrip tion</Name ><Label>De scription< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>{target .Name} cla ims that i t did not receive da ta from a source out side the t rust bound ary. Consi der using logging or auditing to record the source , time, an d summary of the rec eived data .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Pot ential Dat a Repudiat ion by {ta rget.Name} </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>R</a:Cat egory><a:D escription >{target.N ame} claim s that it did not re ceive data from a pr ocess on t he other s ide of the trust bou ndary. Con sider usin g logging or auditin g to recor d the sour ce, time, and summar y of the r eceived da ta.</a:Des cription>< a:Generati onFilters> <a:Exclude /><a:Inclu de>target is 'GE.EI' and (flow crosses ' GE.TB.L' o r flow cro sses 'GE.T B.B')</a:I nclude></a :Generatio nFilters>< a:Id>R7</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>R epudiation threats i nvolve an adversary denying th at somethi ng happene d.</b:stri ng></Value s><Id>5d3b 996b-aed5- 4d95-8cf6- 617bb67bf0 42</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Us erThreatDe scription< /Name><Lab el>Descrip tion</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string>{t arget.Name } claims t hat it did not recei ve data fr om a proce ss on the other side of the tr ust bounda ry. Consid er using l ogging or auditing t o record t he source, time, and summary o f the rece ived data. </b:string ></Values> <Id>cf377f 97-9dea-42 d6-ae63-b0 97c4a8ec4d </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>Prio rity</Name ><Label>Pr iority</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string i:nil="tru e"/></Valu es><Id>bc9 c6e2a-15d0 -4863-9cac -589e51e4c a1e</Id></ ThreatMeta Datum></a: Properties MetaData>< a:RelatedC ategory i: nil="true" /><a:Short Title>Exte rnal Entit y {target. Name} Pote ntially De nies Recei ving Data< /a:ShortTi tle></a:Th reatType>< a:ThreatTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Category >R</a:Cate gory><a:De scription> {target.Na me} claims that it d id not wri te data re ceived fro m an entit y on the o ther side of the tru st boundar y. Conside r using lo gging or a uditing to record th e source, time, and summary of the recei ved data.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include>t arget is ' GE.DS' and (flow cro sses 'GE.T B.L' or fl ow crosses 'GE.TB.B' )</a:Inclu de></a:Gen erationFil ters><a:Id >R8</a:Id> <a:Propert iesMetaDat a><ThreatM etaDatum>< Name>UserT hreatShort Descriptio n</Name><L abel>Short Descripti on</Label> <HideFromU I>true</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>Repud iation thr eats invol ve an adve rsary deny ing that s omething h appened.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>{targe t.Name} cl aims that it did not write dat a received from an e ntity on t he other s ide of the trust bou ndary. Con sider usin g logging or auditin g to recor d the sour ce, time, and summar y of the r eceived da ta.</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>D ata Store Denies {ta rget.Name} Potential ly Writing Data</a:S hortTitle> </a:Threat Type><a:Th reatType>< a:IsExtens ion>false< /a:IsExten sion><a:Ca tegory>I</ a:Category ><a:Descri ption>Thre at was mig rated from V3.</a:De scription> <a:Generat ionFilters ><a:Exclud e/><a:Incl ude>source is 'ROOT' </a:Includ e></a:Gene rationFilt ers><a:Id> IU</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Inform ation disc losure hap pens when the inform ation can be read by an unauth orized par ty.</b:str ing></Valu es><Id>5d3 b996b-aed5 -4d95-8cf6 -617bb67bf 042</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>U serThreatD escription </Name><La bel>Descri ption</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>T hreat was migrated f rom V3.</b :string></ Values><Id >cf377f97- 9dea-42d6- ae63-b097c 4a8ec4d</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>Priorit y</Name><L abel>Prior ity</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string i:n il="true"/ ></Values> <Id>bc9c6e 2a-15d0-48 63-9cac-58 9e51e4ca1e </Id></Thr eatMetaDat um></a:Pro pertiesMet aData><a:R elatedCate gory i:nil ="true"/>< a:ShortTit le>Informa tion Discl osure (v3) </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>I</a:Cat egory><a:D escription >Can you a ccess {tar get.Name} and bypass the permi ssions for the objec t? For exa mple by ed iting the files dire ctly with a hex edit or, or rea ching it v ia filesha ring? Ensu re that yo ur program is the on ly one tha t can acce ss the dat a, and tha t all othe r subjects have to u se your in terface.</ a:Descript ion><a:Gen erationFil ters><a:Ex clude/><a: Include>so urce is 'G E.P' and t arget is ' GE.DS' and source.im plementsCu stomAuthor izationMec hanism is 'Yes'</a:I nclude></a :Generatio nFilters>< a:Id>I2</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>I nformation disclosur e happens when the i nformation can be re ad by an u nauthorize d party.</ b:string>< /Values><I d>5d3b996b -aed5-4d95 -8cf6-617b b67bf042</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>UserTh reatDescri ption</Nam e><Label>D escription </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Can yo u access { target.Nam e} and byp ass the pe rmissions for the ob ject? For example by editing t he files d irectly wi th a hex e ditor, or reaching i t via file sharing? E nsure that your prog ram is the only one that can a ccess the data, and that all o ther subje cts have t o use your interface .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Aut horization Bypass</a :ShortTitl e></a:Thre atType><a: ThreatType ><a:IsExte nsion>fals e</a:IsExt ension><a: Category>I </a:Catego ry><a:Desc ription>Da ta flowing across {f low.Name} may be sni ffed by an attacker. Depending on what t ype of dat a an attac ker can re ad, it may be used t o attack o ther parts of the sy stem or si mply be a disclosure of inform ation lead ing to com pliance vi olations. Consider e ncrypting the data f low.</a:De scription> <a:Generat ionFilters ><a:Exclud e>flow.pro videsConfi dentiality is 'Yes'< /a:Exclude ><a:Includ e>((source is 'GE.P' or source is 'GE.EI ') and tar get is 'GE .P' and (f low crosse s 'GE.TB.L ' or flow crosses 'G E.TB.B')) or (source is 'GE.P' and targe t is 'GE.D S' and (fl ow crosses 'GE.TB.L' or flow c rosses 'GE .TB.B'))</ a:Include> </a:Genera tionFilter s><a:Id>I6 </a:Id><a: Properties MetaData>< ThreatMeta Datum><Nam e>UserThre atShortDes cription</ Name><Labe l>Short De scription< /Label><Hi deFromUI>t rue</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>Informat ion disclo sure happe ns when th e informat ion can be read by a n unauthor ized party .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Dat a flowing across {fl ow.Name} m ay be snif fed by an attacker. Depending on what ty pe of data an attack er can rea d, it may be used to attack ot her parts of the sys tem or sim ply be a d isclosure of informa tion leadi ng to comp liance vio lations. C onsider en crypting t he data fl ow.</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>D ata Flow S niffing</a :ShortTitl e></a:Thre atType><a: ThreatType ><a:IsExte nsion>fals e</a:IsExt ension><a: Category>I </a:Catego ry><a:Desc ription>Im proper dat a protecti on of {sou rce.name} can allow an attacke r to read informatio n not inte nded for d isclosure. Review au thorizatio n settings .</a:Descr iption><a: Generation Filters><a :Exclude/> <a:Include >source is 'GE.DS' a nd (target is 'GE.P' or target is 'GE.EI ')</a:Incl ude></a:Ge nerationFi lters><a:I d>I23</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Inf ormation d isclosure happens wh en the inf ormation c an be read by an una uthorized party.</b: string></V alues><Id> 5d3b996b-a ed5-4d95-8 cf6-617bb6 7bf042</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>UserThre atDescript ion</Name> <Label>Des cription</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>Improper data prot ection of {source.na me} can al low an att acker to r ead inform ation not intended f or disclos ure. Revie w authoriz ation sett ings.</b:s tring></Va lues><Id>c f377f97-9d ea-42d6-ae 63-b097c4a 8ec4d</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >Priority< /Name><Lab el>Priorit y</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring i:nil ="true"/>< /Values><I d>bc9c6e2a -15d0-4863 -9cac-589e 51e4ca1e</ Id></Threa tMetaDatum ></a:Prope rtiesMetaD ata><a:Rel atedCatego ry i:nil=" true"/><a: ShortTitle >Weak Acce ss Control for a Res ource</a:S hortTitle> </a:Threat Type><a:Th reatType>< a:IsExtens ion>false< /a:IsExten sion><a:Ca tegory>I</ a:Category ><a:Descri ption>Cred entials he ld at the server are often dis closed or tampered w ith and cr edentials stored on the client are often stolen. F or server side, cons ider stori ng a salte d hash of the creden tials inst ead of sto ring the c redentials themselve s. If this is not po ssible due to busine ss require ments, be sure to en crypt the credential s before s torage, us ing an SDL -approved mechanism. For clien t side, if storing c redentials is requir ed, encryp t them and protect t he data st ore in whi ch they're stored</a :Descripti on><a:Gene rationFilt ers><a:Exc lude/><a:I nclude>sou rce is 'GE .P' and ta rget is 'G E.DS' and target.sto resCredent ials is 'Y es'</a:Inc lude></a:G enerationF ilters><a: Id>I24</a: Id><a:Prop ertiesMeta Data><Thre atMetaDatu m><Name>Us erThreatSh ortDescrip tion</Name ><Label>Sh ort Descri ption</Lab el><HideFr omUI>true< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string>In formation disclosure happens w hen the in formation can be rea d by an un authorized party.</b :string></ Values><Id >5d3b996b- aed5-4d95- 8cf6-617bb 67bf042</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatDescrip tion</Name ><Label>De scription< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Credent ials held at the ser ver are of ten disclo sed or tam pered with and crede ntials sto red on the client ar e often st olen. For server sid e, conside r storing a salted h ash of the credentia ls instead of storin g the cred entials th emselves. If this is not possi ble due to business requiremen ts, be sur e to encry pt the cre dentials b efore stor age, using an SDL-ap proved mec hanism. Fo r client s ide, if st oring cred entials is required, encrypt t hem and pr otect the data store in which they're st ored</b:st ring></Val ues><Id>cf 377f97-9de a-42d6-ae6 3-b097c4a8 ec4d</Id>< /ThreatMet aDatum><Th reatMetaDa tum><Name> Priority</ Name><Labe l>Priority </Label><H ideFromUI> false</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing i:nil= "true"/></ Values><Id >bc9c6e2a- 15d0-4863- 9cac-589e5 1e4ca1e</I d></Threat MetaDatum> </a:Proper tiesMetaDa ta><a:Rela tedCategor y i:nil="t rue"/><a:S hortTitle> Weak Crede ntial Stor age</a:Sho rtTitle></ a:ThreatTy pe><a:Thre atType><a: IsExtensio n>false</a :IsExtensi on><a:Cate gory>I</a: Category>< a:Descript ion>Creden tials on t he wire ar e often su bject to s niffing by an attack er. Are th e credenti als re-usa ble/re-pla yable? Are credentia ls include d in a mes sage? For example, s ending a z ip file wi th the pas sword in t he email. Use strong cryptogra phy for th e transmis sion of cr edentials. Use the O S librarie s if at al l possible , and cons ider crypt ographic a lgorithm a gility, ra ther than hardcoding a choice. </a:Descri ption><a:G enerationF ilters><a: Exclude>fl ow is 'SE. DF.TMCore. HTTPS' or flow is 'S E.DF.TMCor e.IPsec'</ a:Exclude> <a:Include >source is 'GE.P' an d (target is 'GE.P' or target is 'GE.DS' ) and (flo w crosses 'SE.TB.L.T MCore.Mach ine')</a:I nclude></a :Generatio nFilters>< a:Id>I25</ a:Id><a:Pr opertiesMe taData><Th reatMetaDa tum><Name> UserThreat ShortDescr iption</Na me><Label> Short Desc ription</L abel><Hide FromUI>tru e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> Informatio n disclosu re happens when the informatio n can be r ead by an unauthoriz ed party.< /b:string> </Values>< Id>5d3b996 b-aed5-4d9 5-8cf6-617 bb67bf042< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>UserT hreatDescr iption</Na me><Label> Descriptio n</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>Crede ntials on the wire a re often s ubject to sniffing b y an attac ker. Are t he credent ials re-us able/re-pl ayable? Ar e credenti als includ ed in a me ssage? For example, sending a zip file w ith the pa ssword in the email. Use stron g cryptogr aphy for t he transmi ssion of c redentials . Use the OS librari es if at a ll possibl e, and con sider cryp tographic algorithm agility, r ather than hardcodin g a choice .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Wea k Credenti al Transit </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>I</a:Cat egory><a:D escription >Custom au thenticati on schemes are susce ptible to common wea knesses su ch as weak credentia l change m anagement, credentia l equivale nce, easil y guessabl e credenti als, null credential s, downgra de authent ication or a weak cr edential c hange mana gement sys tem. Consi der the im pact and p otential m itigations for your custom aut henticatio n scheme.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include>s ource is ' GE.P' and target is 'GE.P' and source.im plementsAu thenticati onScheme i s 'Yes'</a :Include>< /a:Generat ionFilters ><a:Id>I26 </a:Id><a: Properties MetaData>< ThreatMeta Datum><Nam e>UserThre atShortDes cription</ Name><Labe l>Short De scription< /Label><Hi deFromUI>t rue</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>Informat ion disclo sure happe ns when th e informat ion can be read by a n unauthor ized party .</b:strin g></Values ><Id>5d3b9 96b-aed5-4 d95-8cf6-6 17bb67bf04 2</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Use rThreatDes cription</ Name><Labe l>Descript ion</Label ><HideFrom UI>false</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>Cus tom authen tication s chemes are susceptib le to comm on weaknes ses such a s weak cre dential ch ange manag ement, cre dential eq uivalence, easily gu essable cr edentials, null cred entials, d owngrade a uthenticat ion or a w eak creden tial chang e manageme nt system. Consider the impact and poten tial mitig ations for your cust om authent ication sc heme.</b:s tring></Va lues><Id>c f377f97-9d ea-42d6-ae 63-b097c4a 8ec4d</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >Priority< /Name><Lab el>Priorit y</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring i:nil ="true"/>< /Values><I d>bc9c6e2a -15d0-4863 -9cac-589e 51e4ca1e</ Id></Threa tMetaDatum ></a:Prope rtiesMetaD ata><a:Rel atedCatego ry i:nil=" true"/><a: ShortTitle >Weak Auth entication Scheme</a :ShortTitl e></a:Thre atType><a: ThreatType ><a:IsExte nsion>fals e</a:IsExt ension><a: Category>D </a:Catego ry><a:Desc ription>Th reat was m igrated fr om V3.</a: Descriptio n><a:Gener ationFilte rs><a:Excl ude/><a:In clude>sour ce is 'ROO T'</a:Incl ude></a:Ge nerationFi lters><a:I d>DU</a:Id ><a:Proper tiesMetaDa ta><Threat MetaDatum> <Name>User ThreatShor tDescripti on</Name>< Label>Shor t Descript ion</Label ><HideFrom UI>true</H ideFromUI> <Values xm lns:b="htt p://schema s.microsof t.com/2003 /10/Serial ization/Ar rays"><b:s tring>Deni al of Serv ice happen s when the process o r a datast ore is not able to s ervice inc oming requ ests or pe rform up t o spec.</b :string></ Values><Id >5d3b996b- aed5-4d95- 8cf6-617bb 67bf042</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatDescrip tion</Name ><Label>De scription< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Threat was migrat ed from V3 .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Den ial Of Ser vice (v3)< /a:ShortTi tle></a:Th reatType>< a:ThreatTy pe><a:IsEx tension>fa lse</a:IsE xtension>< a:Category >D</a:Cate gory><a:De scription> Does {sour ce.Name} o r {target. Name} take explicit steps to c ontrol res ource cons umption? R esource co nsumption attacks ca n be hard to deal wi th, and th ere are ti mes that i t makes se nse to let the OS do the job. Be careful that your resource requests d on't deadl ock, and t hat they d o timeout. </a:Descri ption><a:G enerationF ilters><a: Exclude/>< a:Include> source is 'GE.P' and target is 'GE.DS'</ a:Include> </a:Genera tionFilter s><a:Id>D2 </a:Id><a: Properties MetaData>< ThreatMeta Datum><Nam e>UserThre atShortDes cription</ Name><Labe l>Short De scription< /Label><Hi deFromUI>t rue</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>Denial o f Service happens wh en the pro cess or a datastore is not abl e to servi ce incomin g requests or perfor m up to sp ec.</b:str ing></Valu es><Id>5d3 b996b-aed5 -4d95-8cf6 -617bb67bf 042</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>U serThreatD escription </Name><La bel>Descri ption</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>D oes {sourc e.Name} or {target.N ame} take explicit s teps to co ntrol reso urce consu mption? Re source con sumption a ttacks can be hard t o deal wit h, and the re are tim es that it makes sen se to let the OS do the job. B e careful that your resource r equests do n't deadlo ck, and th at they do timeout.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>Poten tial Exces sive Resou rce Consum ption for {source.Na me} or {ta rget.Name} </a:ShortT itle></a:T hreatType> <a:ThreatT ype><a:IsE xtension>f alse</a:Is Extension> <a:Categor y>D</a:Cat egory><a:D escription >{target.N ame} crash es, halts, stops or runs slowl y; in all cases viol ating an a vailabilit y metric.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include>t arget is ' GE.P' and (flow cros ses 'GE.TB .L' or flo w crosses 'GE.TB.B') </a:Includ e></a:Gene rationFilt ers><a:Id> D3</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>Denial of Servic e happens when the p rocess or a datastor e is not a ble to ser vice incom ing reques ts or perf orm up to spec.</b:s tring></Va lues><Id>5 d3b996b-ae d5-4d95-8c f6-617bb67 bf042</Id> </ThreatMe taDatum><T hreatMetaD atum><Name >UserThrea tDescripti on</Name>< Label>Desc ription</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string >{target.N ame} crash es, halts, stops or runs slowl y; in all cases viol ating an a vailabilit y metric.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>Poten tial Proce ss Crash o r Stop for {target.N ame}</a:Sh ortTitle>< /a:ThreatT ype><a:Thr eatType><a :IsExtensi on>false</ a:IsExtens ion><a:Cat egory>D</a :Category> <a:Descrip tion>An ex ternal age nt interru pts data f lowing acr oss a trus t boundary in either direction .</a:Descr iption><a: Generation Filters><a :Exclude/> <a:Include >(flow cro sses 'GE.T B.L' or fl ow crosses 'GE.TB.B' )</a:Inclu de></a:Gen erationFil ters><a:Id >D4</a:Id> <a:Propert iesMetaDat a><ThreatM etaDatum>< Name>UserT hreatShort Descriptio n</Name><L abel>Short Descripti on</Label> <HideFromU I>true</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>Denia l of Servi ce happens when the process or a datasto re is not able to se rvice inco ming reque sts or per form up to spec.</b: string></V alues><Id> 5d3b996b-a ed5-4d95-8 cf6-617bb6 7bf042</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>UserThre atDescript ion</Name> <Label>Des cription</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>An exter nal agent interrupts data flow ing across a trust b oundary in either di rection.</ b:string>< /Values><I d>cf377f97 -9dea-42d6 -ae63-b097 c4a8ec4d</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>Priori ty</Name>< Label>Prio rity</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string i: nil="true" /></Values ><Id>bc9c6 e2a-15d0-4 863-9cac-5 89e51e4ca1 e</Id></Th reatMetaDa tum></a:Pr opertiesMe taData><a: RelatedCat egory i:ni l="true"/> <a:ShortTi tle>Data F low {flow. Name} Is P otentially Interrupt ed</a:Shor tTitle></a :ThreatTyp e><a:Threa tType><a:I sExtension >false</a: IsExtensio n><a:Categ ory>D</a:C ategory><a :Descripti on>An exte rnal agent prevents access to a data sto re on the other side of the tr ust bounda ry.</a:Des cription>< a:Generati onFilters> <a:Exclude /><a:Inclu de>(source is 'GE.DS ' or targe t is 'GE.D S') and (f low crosse s 'GE.TB.L ' or flow crosses 'G E.TB.B')</ a:Include> </a:Genera tionFilter s><a:Id>D5 </a:Id><a: Properties MetaData>< ThreatMeta Datum><Nam e>UserThre atShortDes cription</ Name><Labe l>Short De scription< /Label><Hi deFromUI>t rue</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>Denial o f Service happens wh en the pro cess or a datastore is not abl e to servi ce incomin g requests or perfor m up to sp ec.</b:str ing></Valu es><Id>5d3 b996b-aed5 -4d95-8cf6 -617bb67bf 042</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>U serThreatD escription </Name><La bel>Descri ption</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>A n external agent pre vents acce ss to a da ta store o n the othe r side of the trust boundary.< /b:string> </Values>< Id>cf377f9 7-9dea-42d 6-ae63-b09 7c4a8ec4d< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>Prior ity</Name> <Label>Pri ority</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string i :nil="true "/></Value s><Id>bc9c 6e2a-15d0- 4863-9cac- 589e51e4ca 1e</Id></T hreatMetaD atum></a:P ropertiesM etaData><a :RelatedCa tegory i:n il="true"/ ><a:ShortT itle>Data Store Inac cessible</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> E</a:Categ ory><a:Des cription>T hreat was migrated f rom V3.</a :Descripti on><a:Gene rationFilt ers><a:Exc lude/><a:I nclude>sou rce is 'RO OT'</a:Inc lude></a:G enerationF ilters><a: Id>EU</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>A u ser subjec t gains in creased ca pability o r privileg e by takin g advantag e of an im plementati on bug.</b :string></ Values><Id >5d3b996b- aed5-4d95- 8cf6-617bb 67bf042</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatDescrip tion</Name ><Label>De scription< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Threat was migrat ed from V3 .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Ele vation Of Privilege (v3)</a:Sh ortTitle>< /a:ThreatT ype><a:Thr eatType><a :IsExtensi on>false</ a:IsExtens ion><a:Cat egory>E</a :Category> <a:Descrip tion>Commo n SSO impl ementation s such as OAUTH2 and OAUTH Wra p are vuln erable to MitM attac ks.</a:Des cription>< a:Generati onFilters> <a:Exclude >(target i s 'SE.EI.T MCore.Auth Provider' and target .MS is 'Ye s')</a:Exc lude><a:In clude>targ et is 'SE. EI.TMCore. AuthProvid er'</a:Inc lude></a:G enerationF ilters><a: Id>E3</a:I d><a:Prope rtiesMetaD ata><Threa tMetaDatum ><Name>Use rThreatSho rtDescript ion</Name> <Label>Sho rt Descrip tion</Labe l><HideFro mUI>true</ HideFromUI ><Values x mlns:b="ht tp://schem as.microso ft.com/200 3/10/Seria lization/A rrays"><b: string>A u ser subjec t gains in creased ca pability o r privileg e by takin g advantag e of an im plementati on bug.</b :string></ Values><Id >5d3b996b- aed5-4d95- 8cf6-617bb 67bf042</I d></Threat MetaDatum> <ThreatMet aDatum><Na me>UserThr eatDescrip tion</Name ><Label>De scription< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>Common SSO implem entations such as OA UTH2 and O AUTH Wrap are vulner able to Mi tM attacks .</b:strin g></Values ><Id>cf377 f97-9dea-4 2d6-ae63-b 097c4a8ec4 d</Id></Th reatMetaDa tum><Threa tMetaDatum ><Name>Pri ority</Nam e><Label>P riority</L abel><Hide FromUI>fal se</HideFr omUI><Valu es xmlns:b ="http://s chemas.mic rosoft.com /2003/10/S erializati on/Arrays" ><b:string i:nil="tr ue"/></Val ues><Id>bc 9c6e2a-15d 0-4863-9ca c-589e51e4 ca1e</Id>< /ThreatMet aDatum></a :Propertie sMetaData> <a:Related Category i :nil="true "/><a:Shor tTitle>Wea kness in S SO Authori zation</a: ShortTitle ></a:Threa tType><a:T hreatType> <a:IsExten sion>false </a:IsExte nsion><a:C ategory>E< /a:Categor y><a:Descr iption>{ta rget.Name} may be ab le to impe rsonate th e context of {source .Name} in order to g ain additi onal privi lege.</a:D escription ><a:Genera tionFilter s><a:Exclu de/><a:Inc lude>(sour ce is 'GE. EI' or sou rce is 'GE .P') and t arget is ' GE.P'</a:I nclude></a :Generatio nFilters>< a:Id>E5</a :Id><a:Pro pertiesMet aData><Thr eatMetaDat um><Name>U serThreatS hortDescri ption</Nam e><Label>S hort Descr iption</La bel><HideF romUI>true </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>A user subj ect gains increased capability or privil ege by tak ing advant age of an implementa tion bug.< /b:string> </Values>< Id>5d3b996 b-aed5-4d9 5-8cf6-617 bb67bf042< /Id></Thre atMetaDatu m><ThreatM etaDatum>< Name>UserT hreatDescr iption</Na me><Label> Descriptio n</Label>< HideFromUI >false</Hi deFromUI>< Values xml ns:b="http ://schemas .microsoft .com/2003/ 10/Seriali zation/Arr ays"><b:st ring>{targ et.Name} m ay be able to impers onate the context of {source.N ame} in or der to gai n addition al privile ge.</b:str ing></Valu es><Id>cf3 77f97-9dea -42d6-ae63 -b097c4a8e c4d</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>P riority</N ame><Label >Priority< /Label><Hi deFromUI>f alse</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> bc9c6e2a-1 5d0-4863-9 cac-589e51 e4ca1e</Id ></ThreatM etaDatum>< /a:Propert iesMetaDat a><a:Relat edCategory i:nil="tr ue"/><a:Sh ortTitle>E levation U sing Imper sonation</ a:ShortTit le></a:Thr eatType><a :ThreatTyp e><a:IsExt ension>fal se</a:IsEx tension><a :Category> E</a:Categ ory><a:Des cription>{ source.Nam e} may be able to re motely exe cute code for {targe t.Name}.</ a:Descript ion><a:Gen erationFil ters><a:Ex clude/><a: Include>ta rget is 'G E.P' and ( flow cross es 'GE.TB. L' or flow crosses ' GE.TB.B')< /a:Include ></a:Gener ationFilte rs><a:Id>E 6</a:Id><a :Propertie sMetaData> <ThreatMet aDatum><Na me>UserThr eatShortDe scription< /Name><Lab el>Short D escription </Label><H ideFromUI> true</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng>A user subject ga ins increa sed capabi lity or pr ivilege by taking ad vantage of an implem entation b ug.</b:str ing></Valu es><Id>5d3 b996b-aed5 -4d95-8cf6 -617bb67bf 042</Id></ ThreatMeta Datum><Thr eatMetaDat um><Name>U serThreatD escription </Name><La bel>Descri ption</Lab el><HideFr omUI>false </HideFrom UI><Values xmlns:b=" http://sch emas.micro soft.com/2 003/10/Ser ialization /Arrays">< b:string>{ source.Nam e} may be able to re motely exe cute code for {targe t.Name}.</ b:string>< /Values><I d>cf377f97 -9dea-42d6 -ae63-b097 c4a8ec4d</ Id></Threa tMetaDatum ><ThreatMe taDatum><N ame>Priori ty</Name>< Label>Prio rity</Labe l><HideFro mUI>false< /HideFromU I><Values xmlns:b="h ttp://sche mas.micros oft.com/20 03/10/Seri alization/ Arrays"><b :string i: nil="true" /></Values ><Id>bc9c6 e2a-15d0-4 863-9cac-5 89e51e4ca1 e</Id></Th reatMetaDa tum></a:Pr opertiesMe taData><a: RelatedCat egory i:ni l="true"/> <a:ShortTi tle>{targe t.Name} Ma y be Subje ct to Elev ation of P rivilege U sing Remot e Code Exe cution</a: ShortTitle ></a:Threa tType><a:T hreatType> <a:IsExten sion>false </a:IsExte nsion><a:C ategory>E< /a:Categor y><a:Descr iption>An attacker m ay pass da ta into {t arget.Name } in order to change the flow of program execution within {t arget.Name } to the a ttacker's choosing.< /a:Descrip tion><a:Ge nerationFi lters><a:E xclude/><a :Include>t arget is ' GE.P' and (flow cros ses 'GE.TB .L' or flo w crosses 'GE.TB.B') </a:Includ e></a:Gene rationFilt ers><a:Id> E7</a:Id>< a:Properti esMetaData ><ThreatMe taDatum><N ame>UserTh reatShortD escription </Name><La bel>Short Descriptio n</Label>< HideFromUI >true</Hid eFromUI><V alues xmln s:b="http: //schemas. microsoft. com/2003/1 0/Serializ ation/Arra ys"><b:str ing>A user subject g ains incre ased capab ility or p rivilege b y taking a dvantage o f an imple mentation bug.</b:st ring></Val ues><Id>5d 3b996b-aed 5-4d95-8cf 6-617bb67b f042</Id>< /ThreatMet aDatum><Th reatMetaDa tum><Name> UserThreat Descriptio n</Name><L abel>Descr iption</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string> An attacke r may pass data into {target.N ame} in or der to cha nge the fl ow of prog ram execut ion within {target.N ame} to th e attacker 's choosin g.</b:stri ng></Value s><Id>cf37 7f97-9dea- 42d6-ae63- b097c4a8ec 4d</Id></T hreatMetaD atum><Thre atMetaDatu m><Name>Pr iority</Na me><Label> Priority</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g i:nil="t rue"/></Va lues><Id>b c9c6e2a-15 d0-4863-9c ac-589e51e 4ca1e</Id> </ThreatMe taDatum></ a:Properti esMetaData ><a:Relate dCategory i:nil="tru e"/><a:Sho rtTitle>El evation by Changing the Execut ion Flow i n {target. Name}</a:S hortTitle> </a:Threat Type><a:Th reatType>< a:IsExtens ion>false< /a:IsExten sion><a:Ca tegory>E</ a:Category ><a:Descri ption>Cros s-site req uest forge ry (CSRF o r XSRF) is a type of attack in which an attacker f orces a us er's brows er to make a forged request to a vulnera ble site b y exploiti ng an exis ting trust relations hip betwee n the brow ser and th e vulnerab le web sit e. In a s imple scen ario, a us er is logg ed in to w eb site A using a co okie as a credential . The oth er browses to web si te B. Web site B re turns a pa ge with a hidden for m that pos ts to web site A. S ince the b rowser wil l carry th e user's c ookie to w eb site A, web site B now can take any a ction on w eb site A, for examp le, adding an admin to an acco unt. The attack can be used t o exploit any reques ts that th e browser automatica lly authen ticates, e .g. by ses sion cooki e, integra ted authen tication, IP whiteli sting, … The atta ck can be carried ou t in many ways such as by luri ng the vic tim to a s ite under control of the attac ker, getti ng the use r to click a link in a phishin g email, o r hacking a reputabl e web site that the victim wil l visit. T he issue c an only be resolved on the ser ver side b y requirin g that all authentic ated state -changing requests i nclude an additional piece of secret pay load (cana ry or CSRF token) wh ich is kno wn only to the legit imate web site and t he browser and which is protec ted in tra nsit throu gh SSL/TLS . See the Forgery Pr otection p roperty on the flow stencil fo r a list o f mitigati ons.</a:De scription> <a:Generat ionFilters ><a:Exclud e>(source is 'SE.P.T MCore.OSPr ocess' or source is 'SE.P.TMCo re.Thread' or source is 'SE.P. TMCore.Ker nelThread' or source is 'SE.P. TMCore.Win App' or so urce is 'S E.P.TMCore .NetApp' o r source i s 'SE.P.TM Core.WebSe rver' or s ource is ' SE.P.TMCor e.Win32Ser vice' or source is 'SE.P.TMCo re.WebSvc' or source is 'SE.P. TMCore.VM' or (sourc e is 'SE.P .TMCore.Mo dern' and source.int ernetClien tServer is 'No' and source.int ernetClien t is 'No' ) or sourc e is 'SE.E I.TMCore.A uthProvide r' or sour ce is 'SE. EI.TMCore. WebSvc' or source is 'SE.EI.TM Core.WebAp p' or sour ce is 'SE. EI.TMCore. Megasevric e' or sour ce is 'SE. EI.TMCore. CRT' or so urce is 'S E.EI.TMCor e.NFX' or source is 'SE.EI.TMC ore.WinRT' ) or (tar get is 'SE .P.TMCore. ThickClien t' or targ et is 'SE. P.TMCore.B rowserClie nt' or tar get is 'SE .P.TMCore. PlugIn' or target is 'SE.P.TMC ore.Modern ') or (flo w crosses 'SE.TB.L.T MCore.Mach ine' or fl ow crosses 'SE.TB.L. TMCore.Ker nel' or fl ow crosses 'SE.TB.L. TMCore.App Container' or flow c rosses 'SE .TB.B.TMCo re.CorpNet ' or flow crosses 'S E.TB.B.TMC ore.Sandbo x')</a:Exc lude><a:In clude>(sou rce is 'GE .P' or so urce is ' GE.EI') an d (target is 'GE.P' ) and (flo w.authenti catesSourc e is 'Not Selected' or flow.a uthenticat esSource i s 'Yes') a nd (flow.5 4851a3b-65 da-4902-b4 e0-94ef015 be735 is ' None' or f low.54851a 3b-65da-49 02-b4e0-94 ef015be735 is 'Not S elected' ) and (flow crosses ' GE.TB.L' o r flow cro sses 'GE.T B.B')</a:I nclude></a :Generatio nFilters>< a:Id>8404d cf5-bdd8-4 902-abc2-3 b6c967b026 1</a:Id><a :Propertie sMetaData> <ThreatMet aDatum><Na me>UserThr eatShortDe scription< /Name><Lab el>Short D escription </Label><H ideFromUI> true</Hide FromUI><Va lues xmlns :b="http:/ /schemas.m icrosoft.c om/2003/10 /Serializa tion/Array s"><b:stri ng i:nil=" true"/></V alues><Id> 5d3b996b-a ed5-4d95-8 cf6-617bb6 7bf042</Id ></ThreatM etaDatum>< ThreatMeta Datum><Nam e>UserThre atDescript ion</Name> <Label>Des cription</ Label><Hid eFromUI>fa lse</HideF romUI><Val ues xmlns: b="http:// schemas.mi crosoft.co m/2003/10/ Serializat ion/Arrays "><b:strin g>Cross-si te request forgery ( CSRF or XS RF) is a t ype of att ack in whi ch an atta cker force s a user's browser t o make a f orged requ est to a v ulnerable site by ex ploiting a n existing trust rel ationship between th e browser and the vu lnerable w eb site. In a simpl e scenario , a user i s logged i n to web s ite A usin g a cookie as a cred ential. T he other b rowses to web site B . Web sit e B return s a page w ith a hidd en form th at posts t o web site A. Since the brows er will ca rry the us er's cooki e to web s ite A, web site B no w can take any actio n on web s ite A, for example, adding an admin to a n account. The atta ck can be used to ex ploit any requests t hat the br owser auto matically authentica tes, e.g. by session cookie, i ntegrated authentica tion, IP w hitelistin g, … Th e attack c an be carr ied out in many ways such as b y luring t he victim to a site under cont rol of the attacker, getting t he user to click a l ink in a p hishing em ail, or ha cking a re putable we b site tha t the vict im will vi sit. The i ssue can o nly be res olved on t he server side by re quiring th at all aut henticated state-cha nging requ ests inclu de an addi tional pie ce of secr et payload (canary o r CSRF tok en) which is known o nly to the legitimat e web site and the b rowser and which is protected in transit through S SL/TLS. Se e the Forg ery Protec tion prope rty on the flow sten cil for a list of mi tigations. </b:string ></Values> <Id>cf377f 97-9dea-42 d6-ae63-b0 97c4a8ec4d </Id></Thr eatMetaDat um><Threat MetaDatum> <Name>Prio rity</Name ><Label>Pr iority</La bel><HideF romUI>fals e</HideFro mUI><Value s xmlns:b= "http://sc hemas.micr osoft.com/ 2003/10/Se rializatio n/Arrays"> <b:string i:nil="tru e"/></Valu es><Id>bc9 c6e2a-15d0 -4863-9cac -589e51e4c a1e</Id></ ThreatMeta Datum></a: Properties MetaData>< a:RelatedC ategory/>< a:ShortTit le>Cross S ite Reques t Forgery< /a:ShortTi tle></a:Th reatType>< /a:ThreatT ypes></Kno wledgeBase ><Profile> <PromptedK b xmlns="" /></Profil e></Threat Model> |
Araxis Merge (but not the data content of this report) is Copyright © 1993-2016 Araxis Ltd (www.araxis.com). All rights reserved.