Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Attack23:

    Name:infrastructure interference

    Complexity: Although no mathematical analysis has been published on this issue to date, it appears that analyzing infrastructure interference is quite complex and involves analysis of all of the infrastructure dependencies if the attack is to be directed and controlled. Similarly, the detection and countering of such an attack appears to be quite complex. It would appear that this is at least as complex as solving multiple large min-cut problems. Some initial analysis of U.S. information infrastructure dependencies has been done and has led to a report of about 1,000 pages which only begins to touch the surface of the issue. [SAIC-IW95]
    fc@red.a.net

    Related Database Material

    [TBVTransmission - Relates to Transmission]
    [TBVMalicious - Relates to Malicious]
    [TBVDenial - Relates to Denial]
    [PDRIntegrity - Relates to Integrity]
    [PDRAvailability - Relates to Availability]
    [PDRDemonstrated - Relates to Demonstrated]
    [PLSSystemic - Relates to Systemic]
    [Threat2 - private investigators]
    [Threat5 - vendors]
    [Threat11 - crackers]
    [Threat13 - cyber-gangs]
    [Threat14 - tiger teams]
    [Threat15 - maintenance people]
    [Threat16 - professional thieves]
    [Threat19 - activists]
    [Threat20 - crackers for hire]
    [Threat21 - deranged people]
    [Threat22 - organized crime]
    [Threat23 - drug cartels]
    [Threat24 - terrorists]
    [Threat26 - foreign agents and spies]
    [Threat28 - government agencies]
    [Threat29 - infrastructure warriors]
    [Threat30 - economic rivals]
    [Threat31 - nation states]
    [Threat32 - global coalitions]
    [Threat33 - military organizations]
    [Threat34 - paramilitary groups]
    [Threat35 - information warriors]
    [Threat36 - extortionists]
    [Defense131 - adversary principle (GASSP)]
    [Defense135 - alarms]
    [Defense32 - anomaly detection]
    [Defense45 - augmented authentication devices time or use variant]
    [Defense88 - authenticated information]
    [Defense47 - authorization limitation]
    [Defense8 - automated protection checkers and setters]
    [Defense5 - background checks]
    [Defense46 - biometrics]
    [Defense33 - capture and punishment]
    [Defense57 - change management]
    [Defense105 - Chinese walls]
    [Defense137 - choice of location]
    [Defense49 - classifying information as to sensitivity]
    [Defense120 - clear line of responsibility for protection]
    [Defense94 - concealed services]
    [Defense58 - configuration management]
    [Defense91 - conservative resource allocation]
    [Defense96 - content checking]
    [Defense132 - continuity principle (GASSP)]
    [Defense114 - control physical access]
    [Defense72 - detailed audit]
    [Defense13 - detection before failure]
    [Defense87 - disable unsafe features]
    [Defense75 - disconnect maintenance access]
    [Defense50 - dynamic password change control]
    [Defense7 - effective mandatory access control]
    [Defense76 - effective protection mind-set]
    [Defense63 - encrypted authentication]
    [Defense18 - encryption]
    [Defense139 - environmental controls]
    [Defense71 - Faraday boxes]
    [Defense21 - fault isolation]
    [Defense138 - filtering devices]
    [Defense56 - fine-grained access control]
    [Defense93 - fire doors, fire walls, asbestos suits and similar fire-limiting items]
    [Defense92 - fire suppression equipment]
    [Defense39 - good hiring practices]
    [Defense44 - hard-to-guess passwords]
    [Defense14 - human intervention after detection]
    [Defense65 - increased or enhanced perimeters]
    [Defense119 - individual accountability for all assets and actions]
    [Defense74 - information flow controls]
    [Defense116 - inspection of incoming and outgoing materials]
    [Defense89 - integrity checking]
    [Defense79 - inventory control]
    [Defense37 - least privilege]
    [Defense84 - limited function]
    [Defense85 - limited sharing]
    [Defense86 - limited transitivity]
    [Defense59 - lockouts]
    [Defense82 - locks]
    [Defense110 - low building profile]
    [Defense111 - minimize traffic in work areas]
    [Defense107 - minimizing copies of sensitive information]
    [Defense31 - misuse detection]
    [Defense42 - multi-person controls]
    [Defense43 - multi-version programming]
    [Defense126 - multidisciplinary principle (GASSP)]
    [Defense22 - out-of-range detection]
    [Defense19 - over-damped protocols]
    [Defense69 - path diversity]
    [Defense15 - physical security]
    [Defense77 - physical switches or shields on equipment and devices]
    [Defense112 - place equipment and supplies out of harms way]
    [Defense28 - procedures]
    [Defense121 - program change logs]
    [Defense12 - properly prioritized resource usage]
    [Defense104 - protection of data used in system testing]
    [Defense122 - protection of names of resources]
    [Defense70 - quad-tri-multi-angulation]
    [Defense16 - redundancy]
    [Defense101 - regular review of protection measures]
    [Defense23 - reintegration]
    [Defense100 - retaining confidentiality of security status information]
    [Defense51 - secure design]
    [Defense80 - secure distribution]
    [Defense81 - secure key management]
    [Defense83 - secure or trusted channels]
    [Defense4 - sensors]
    [Defense40 - separation of duties]
    [Defense115 - separation of equipment so as to limit damage from local events]
    [Defense41 - separation of function]
    [Defense133 - simplicity principle (GASSP)]
    [Defense103 - standby equipment]
    [Defense1 - strong change control]
    [Defense48 - security marking and/or labeling]
    [Defense117 - suppression of incomplete, erroneous, or obsolete data]
    [Defense64 - tempest protection]
    [Defense20 - temporary blindness]
    [Defense52 - testing]
    [Defense125 - time, location, function, and other similar access limitations]
    [Defense128 - timeliness principle (GASSP)]
    [Defense106 - tracking, correlation, and analysis of incident reporting and response information]
    [Defense24 - training and awareness]
    [Defense73 - trunk access restriction]
    [Defense9 - trusted applications]
    [Defense78 - trusted repair teams]
    [Defense17 - uninterruptable power supplies and motor generators]
    [Defense113 - universal use of badges]