CAPEC-507 Metadata
Likelihood of Attack
Low
Typical Severity
Low
Overview
Summary
An adversary gains physical access to a system or device through theft of the item. Possession of a system or device enables a number of unique attacks to be executed and often provides the adversary with an extended timeframe for which to perform an attack. Most protections put in place to secure sensitive information can be defeated when an adversary has physical access and enough time.
Prerequisites
This type of attack requires the existence of a physical target that an adversary believes hosts something of value.
Potential Solutions / Mitigations
To mitigate this type of attack, physical security techniques such as locks doors, alarms, and monitoring of targets should be implemented.
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.