{"draft":"draft-ietf-stir-threats-04","doc_id":"RFC7375","title":"Secure Telephone Identity Threat Model","authors":["J. Peterson"],"format":["ASCII","HTML"],"page_count":"13","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Secure Telephone Identity Revisited RAI","abstract":"As the Internet and the telephone network have become increasingly\r\ninterconnected and interdependent, attackers can impersonate or\r\nobscure calling party numbers when orchestrating bulk commercial\r\ncalling schemes, hacking voicemail boxes, or even circumventing\r\nmulti-factor authentication systems trusted by banks. This document\r\nanalyzes threats in the resulting system, enumerating actors,\r\nreviewing the capabilities available to and used by attackers, and\r\ndescribing scenarios in which attacks are launched.","pub_date":"October 2014","keywords":["SIP","Secure Origin Identification","Communication Security","RTCWeb","Threat","Real-Time Communication"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7375","errata_url":null}