Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Attack3:
Name:cable cuts
A cable is cut resulting in disrupted communications, usually requiring emergency response, and otherwise disrupting normal operations.
Complexity: The general issue of cable cutting is quite complex and appears to involve solving many large min-cut problems.
fc@red.a.net
Related Database Material
[TBVTransmission - Relates to Transmission]
[TBVAccidental - Relates to Accidental]
[TBVDenial - Relates to Denial]
[PDRAvailability - Relates to Availability]
[PDRWidespread - Relates to Widespread]
[PLSPhysical - Relates to Physical]
[Threat1 - insiders]
[Threat2 - private investigators]
[Threat7 - Fraudsters]
[Threat8 - competitors]
[Threat14 - tiger teams]
[Threat15 - maintenance people]
[Threat16 - professional thieves]
[Threat18 - vandals]
[Threat19 - activists]
[Threat21 - deranged people]
[Threat22 - organized crime]
[Threat23 - drug cartels]
[Threat24 - terrorists]
[Threat25 - industrial espionage experts]
[Threat26 - foreign agents and spies]
[Threat28 - government agencies]
[Threat29 - infrastructure warriors]
[Threat30 - economic rivals]
[Threat31 - nation states]
[Threat32 - global coalitions]
[Threat33 - military organizations]
[Threat34 - paramilitary groups]
[Threat35 - information warriors]
[Threat36 - extortionists]
[Threat37 - nature]
[Defense135 - alarms]
[Defense62 - analysis of physical characteristics]
[Defense58 - configuration management]
[Defense114 - control physical access]
[Defense21 - fault isolation]
[Defense14 - human intervention after detection]
[Defense65 - increased or enhanced perimeters]
[Defense59 - lockouts]
[Defense82 - locks]
[Defense111 - minimize traffic in work areas]
[Defense69 - path diversity]
[Defense15 - physical security]
[Defense112 - place equipment and supplies out of harms way]
[Defense28 - procedures]
[Defense16 - redundancy]
[Defense83 - secure or trusted channels]
[Defense115 - separation of equipment so as to limit damage from local events]
[Defense103 - standby equipment]
[Defense90 - infrastructure-wide digging hotlines]
[Defense136 - insurance]