All Questions
Tagged with threat-modeling network
4 questions
1
vote
0
answers
436
views
What would be the security rationale for a hotel blocking only SSH traffic? [closed]
I recently stayed at a hotel where outbound SSH traffic (and seemingly only SSH traffic) was blocked on the guest WiFi network, and I'm trying to figure out what security-based rationale they might ...
0
votes
1
answer
183
views
What threats are mitigated by encrypted VPC connections?
We are running a virtual private cloud, in other words a vendor-hosted intranet. (In this case the vendor is AWS, but it could be Azure, Digital Ocean...) The intranet does not have public-facing ...
1
vote
3
answers
431
views
Installed some software over a public insecure wireless network -- should I consider myself compromised?
A couple months earlier, I made the mistake of downloading some software over an insecure wireless network and running it without checking its integrity. I am now considering reinstalling my system, ...
6
votes
4
answers
483
views
Worst case scenario of having the ability to remotely write files to disk as admin
I'm working on creating a program ("My Program") that will communicate with another program ("Their Program") via XML commands over a raw TCP/IP connection. Their program allows files to be written to ...