Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Attack29:

    Name:cascade failures

    Complexity: Only cursory examination of select cascade failures has been completed, but initial indications are that the complexity of creating a cascade failure varies with the situation. In systems operating at or near capacity, cascade failures are easily induced and must be actively prevented or they occur accidentally. [WSCC96] As systems move further away from being tightly coupled and near capacity, cascade failures become for more difficult to accomplish. No general mathematical results have been published to date, but it appears that analyzing cascade failures is at least as complex as fully analyzing the networks in which the cascades are to be created, and this is known for many different sorts of networks.
    fc@red.a.net

    Related Database Material

    [TBVProcessing - Relates to Processing]
    [TBVTransmission - Relates to Transmission]
    [TBVAccidental - Relates to Accidental]
    [PDRAvailability - Relates to Availability]
    [PDRDemonstrated - Relates to Demonstrated]
    [PLSSystemic - Relates to Systemic]
    [Threat14 - tiger teams]
    [Threat28 - government agencies]
    [Threat29 - infrastructure warriors]
    [Threat30 - economic rivals]
    [Threat31 - nation states]
    [Threat32 - global coalitions]
    [Threat33 - military organizations]
    [Threat35 - information warriors]
    [Defense135 - alarms]
    [Defense32 - anomaly detection]
    [Defense30 - audit analysis]
    [Defense35 - awareness of implications]
    [Defense57 - change management]
    [Defense58 - configuration management]
    [Defense91 - conservative resource allocation]
    [Defense132 - continuity principle (GASSP)]
    [Defense114 - control physical access]
    [Defense13 - detection before failure]
    [Defense87 - disable unsafe features]
    [Defense75 - disconnect maintenance access]
    [Defense139 - environmental controls]
    [Defense21 - fault isolation]
    [Defense138 - filtering devices]
    [Defense93 - fire doors, fire walls, asbestos suits and similar fire-limiting items]
    [Defense92 - fire suppression equipment]
    [Defense14 - human intervention after detection]
    [Defense74 - information flow controls]
    [Defense127 - integration principle (GASSP)]
    [Defense130 - internal control principle (GASSP)]
    [Defense10 - isolated sub-file-system areas]
    [Defense86 - limited transitivity]
    [Defense59 - lockouts]
    [Defense31 - misuse detection]
    [Defense126 - multidisciplinary principle (GASSP)]
    [Defense22 - out-of-range detection]
    [Defense19 - over-damped protocols]
    [Defense69 - path diversity]
    [Defense77 - physical switches or shields on equipment and devices]
    [Defense12 - properly prioritized resource usage]
    [Defense11 - quotas]
    [Defense16 - redundancy]
    [Defense23 - reintegration]
    [Defense51 - secure design]
    [Defense4 - sensors]
    [Defense115 - separation of equipment so as to limit damage from local events]
    [Defense41 - separation of function]
    [Defense103 - standby equipment]
    [Defense20 - temporary blindness]
    [Defense52 - testing]
    [Defense125 - time, location, function, and other similar access limitations]
    [Defense106 - tracking, correlation, and analysis of incident reporting and response information]