rddp-5----Page:7
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20 

Threats and Attack Classes
Spoofing
Connection hijacking
Unauthorized STag use
Tampering
Unauthorized modification of remote buffers
Information Disclosure
Unauthorized read access to remote buffers
Denial of Service
Consumption of “precious” resources
Elevation of Privilege
Loading FW onto the RNIC
PPT Version