Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Attack78:

    Name:breaking key management systems

    Complexity: Many key management attacks require a substantial amount of computing power, but this is normally on the order of only a few million computations to break a key that could not be broken exhaustively under any feasible scheme. The complexity of these attacks tends to be specific to the particular key management system. In many cases, the weakest link is the computer housing the keys and this is often attacked in a relatively small amount of time through other techniques.
    fc@red.a.net

    Related Database Material

    [TBVProcessing - Relates to Processing]
    [TBVMalicious - Relates to Malicious]
    [TBVLeakage - Relates to Leakage]
    [PDRIntegrity - Relates to Integrity]
    [PDRConfidentiality - Relates to Confidentiality]
    [PDRUse - Relates to Use]
    [PDRDemonstrated - Relates to Demonstrated]
    [PLSLogical - Relates to Logical]
    [Threat10 - hackers]
    [Threat11 - crackers]
    [Threat13 - cyber-gangs]
    [Threat14 - tiger teams]
    [Threat16 - professional thieves]
    [Threat20 - crackers for hire]
    [Threat23 - drug cartels]
    [Threat26 - foreign agents and spies]
    [Threat27 - police]
    [Threat28 - government agencies]
    [Threat30 - economic rivals]
    [Threat31 - nation states]
    [Threat32 - global coalitions]
    [Threat33 - military organizations]
    [Threat35 - information warriors]
    [Defense131 - adversary principle (GASSP)]
    [Defense35 - awareness of implications]
    [Defense57 - change management]
    [Defense94 - concealed services]
    [Defense58 - configuration management]
    [Defense114 - control physical access]
    [Defense13 - detection before failure]
    [Defense87 - disable unsafe features]
    [Defense75 - disconnect maintenance access]
    [Defense118 - document and information control procedures]
    [Defense7 - effective mandatory access control]
    [Defense6 - feeding false information]
    [Defense39 - good hiring practices]
    [Defense44 - hard-to-guess passwords]
    [Defense65 - increased or enhanced perimeters]
    [Defense89 - integrity checking]
    [Defense10 - isolated sub-file-system areas]
    [Defense37 - least privilege]
    [Defense59 - lockouts]
    [Defense107 - minimizing copies of sensitive information]
    [Defense31 - misuse detection]
    [Defense42 - multi-person controls]
    [Defense108 - numbering and tracking all sensitive information]
    [Defense77 - physical switches or shields on equipment and devices]
    [Defense112 - place equipment and supplies out of harms way]
    [Defense28 - procedures]
    [Defense100 - retaining confidentiality of security status information]
    [Defense51 - secure design]
    [Defense80 - secure distribution]
    [Defense81 - secure key management]
    [Defense83 - secure or trusted channels]
    [Defense48 - security marking and/or labeling]
    [Defense41 - separation of function]
    [Defense1 - strong change control]
    [Defense64 - tempest protection]
    [Defense125 - time, location, function, and other similar access limitations]
    [Defense24 - training and awareness]
    [Defense95 - traps]
    [Defense99 - deceptions]
    [Defense97 - trusted system technologies]
    [Defense2 - waste data destruction]