Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Attack77:

    Name:cryptanalysis

    Complexity: Cryptanalysis is a widely studies mathematical area and typically involves a great deal of expertise and computing power against modern cryptographic systems. Cryptanalysis of improperly designed systems and of systems more invented before the 1940s is almost universally accomplished by relatively simple automation.
    fc@red.a.net

    Related Database Material

    [TBVStorage - Relates to Storage]
    [TBVMalicious - Relates to Malicious]
    [PDRConfidentiality - Relates to Confidentiality]
    [PDRUse - Relates to Use]
    [PDRDemonstrated - Relates to Demonstrated]
    [PLSSystemic - Relates to Systemic]
    [Threat2 - private investigators]
    [Threat10 - hackers]
    [Threat14 - tiger teams]
    [Threat26 - foreign agents and spies]
    [Threat27 - police]
    [Threat28 - government agencies]
    [Threat30 - economic rivals]
    [Threat31 - nation states]
    [Threat32 - global coalitions]
    [Threat33 - military organizations]
    [Threat35 - information warriors]
    [Defense131 - adversary principle (GASSP)]
    [Defense35 - awareness of implications]
    [Defense94 - concealed services]
    [Defense114 - control physical access]
    [Defense99 - deceptions]
    [Defense13 - detection before failure]
    [Defense50 - dynamic password change control]
    [Defense44 - hard-to-guess passwords]
    [Defense66 - noise injection]
    [Defense28 - procedures]
    [Defense83 - secure or trusted channels]
    [Defense68 - spread spectrum]
    [Defense125 - time, location, function, and other similar access limitations]