diff --git a/overview-security.md b/overview-security.md index 3ece07a..c3d89f2 100644 --- a/overview-security.md +++ b/overview-security.md @@ -15,7 +15,7 @@ Risks and threats identified during the conducted workshops are listed below. Pl - [PostgreSQL SQL injection](#threat-postgresql-sql-injection) - [Code injection flaws](#threat-code-injection-flaws) - [Security misconfiguration](#threat-security-misconfiguration) - - [Privacy issues through wrong choice of technology](#threat-wrong-choice-of-technology) + - [Wrong choice of technology](#threat-wrong-choice-of-technology) - [Spoofing of mobile application](#threat-spoofing-of-mobile-application) - [Misbehavior of mobile application due to backup and/or restore of phone and/or mobile application](#threat-misbehavior-of-mobile-application-backup-restore) - [Information leakage of unprotected phone and/or mobile application](#threat-information-leakage-unprotected-phone) @@ -27,7 +27,7 @@ Risks and threats identified during the conducted workshops are listed below. Pl - [Insecure design](#threat-insecure-design) - [Insecure programming](#threat-insecure-programming) - [Security misconfiguration](#threat-security-misconfiguration) - - [Privacy issues through wrong choice of technology](#threat-wrong-choice-of-technology) + - [Wrong choice of technology](#threat-wrong-choice-of-technology) - [Identity disclosure through metadata correlation](#threat-identity-disclosure-meta-data-correlation) - Social network disclosure - Related threats @@ -40,7 +40,7 @@ Risks and threats identified during the conducted workshops are listed below. Pl - [Code injection flaws](#threat-code-injection-flaws) - [Transaction hijacking](#threat-transaction-hijacking) - [Security misconfiguration](#threat-security-misconfiguration) - - [Privacy issues through wrong choice of technology](#threat-wrong-choice-of-technology) + - [Wrong choice of technology](#threat-wrong-choice-of-technology) - [Spoofing of mobile application](#threat-spoofing-of-mobile-application) - [Misbehavior of mobile application due to backup and/or restore of phone and/or mobile application](#threat-misbehavior-of-mobile-application-backup-restore) - [Information leakage of unprotected phone and/or mobile application](#threat-information-leakage-unprotected-phone) @@ -55,7 +55,7 @@ Risks and threats identified during the conducted workshops are listed below. Pl - [Code injection flaws](#threat-code-injection-flaws) - [Transaction hijacking](#threat-transaction-hijacking) - [Security misconfiguration](#threat-security-misconfiguration) - - [Privacy issues through wrong choice of technology](#threat-wrong-choice-of-technology) + - [Wrong choice of technology](#threat-wrong-choice-of-technology) - [Spoofing of mobile application](#threat-spoofing-of-mobile-application) - [Misbehavior of mobile application due to backup and/or restore of phone and/or mobile application](#threat-misbehavior-of-mobile-application-backup-restore) - [Information leakage of unprotected phone and/or mobile application](#threat-information-leakage-unprotected-phone) @@ -138,7 +138,7 @@ Risks and threats identified during the conducted workshops are listed below. Pl - Distributed denial-of-service countermeasures - Use of mutual TLS v1.3 for server to server communication #### Tracing Only - - Privacy issues through wrong choice of technology + - Wrong choice of technology - Proposed controls - App-specific notification mechanism - Minimal logging