Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Attack17:
Name:dumpster diving
Waste product is examined to find information that might be helpful to the attacker.
Complexity: Statistical techniques and historical data appear to be quite sufficient to analyze dumpster diving.
fc@red.a.net
Related Database Material
[TBVOutput - Relates to Output]
[TBVMalicious - Relates to Malicious]
[TBVLeakage - Relates to Leakage]
[PDRConfidentiality - Relates to Confidentiality]
[PDRUse - Relates to Use]
[PDRWidespread - Relates to Widespread]
[PLSPhysical - Relates to Physical]
[Threat2 - private investigators]
[Threat3 - reporters]
[Threat4 - consultants]
[Threat5 - vendors]
[Threat6 - customers]
[Threat7 - Fraudsters]
[Threat8 - competitors]
[Threat9 - whistle blowers]
[Threat10 - hackers]
[Threat11 - crackers]
[Threat12 - club initiates]
[Threat13 - cyber-gangs]
[Threat14 - tiger teams]
[Threat15 - maintenance people]
[Threat16 - professional thieves]
[Threat19 - activists]
[Threat20 - crackers for hire]
[Threat21 - deranged people]
[Threat23 - drug cartels]
[Threat25 - industrial espionage experts]
[Threat26 - foreign agents and spies]
[Threat27 - police]
[Threat28 - government agencies]
[Threat30 - economic rivals]
[Threat31 - nation states]
[Threat32 - global coalitions]
[Threat33 - military organizations]
[Threat34 - paramilitary groups]
[Threat35 - information warriors]
[Threat36 - extortionists]
[Defense131 - adversary principle (GASSP)]
[Defense135 - alarms]
[Defense33 - capture and punishment]
[Defense137 - choice of location]
[Defense114 - control physical access]
[Defense3 - detect waste examination]
[Defense14 - human intervention after detection]
[Defense65 - increased or enhanced perimeters]
[Defense116 - inspection of incoming and outgoing materials]
[Defense82 - locks]
[Defense111 - minimize traffic in work areas]
[Defense107 - minimizing copies of sensitive information]
[Defense15 - physical security]
[Defense28 - procedures]
[Defense2 - waste data destruction]