Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:50 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Attack80:

    Name:error insertion and analysis

    Complexity: The complexity of error insertion is not known, however many researchers have recently claimed to have produced efficient and reliable insertion techniques. Th mathematics in this area is quite new and definitive results are still pending.
    fc@red.a.net

    Related Database Material

    [TBVInput - Relates to Input]
    [TBVProcessing - Relates to Processing]
    [TBVMalicious - Relates to Malicious]
    [TBVDenial - Relates to Denial]
    [TBVUsage - Relates to Usage]
    [PDRIntegrity - Relates to Integrity]
    [PDRTheoretical - Relates to Theoretical]
    [PLSSystemic - Relates to Systemic]
    [Threat1 - insiders]
    [Threat3 - reporters]
    [Threat4 - consultants]
    [Threat5 - vendors]
    [Threat6 - customers]
    [Threat8 - competitors]
    [Threat10 - hackers]
    [Threat11 - crackers]
    [Threat13 - cyber-gangs]
    [Threat14 - tiger teams]
    [Threat16 - professional thieves]
    [Threat20 - crackers for hire]
    [Threat26 - foreign agents and spies]
    [Threat28 - government agencies]
    [Threat30 - economic rivals]
    [Threat31 - nation states]
    [Threat32 - global coalitions]
    [Threat33 - military organizations]
    [Threat35 - information warriors]
    [Defense131 - adversary principle (GASSP)]
    [Defense62 - analysis of physical characteristics]
    [Defense32 - anomaly detection]
    [Defense30 - audit analysis]
    [Defense88 - authenticated information]
    [Defense137 - choice of location]
    [Defense58 - configuration management]
    [Defense91 - conservative resource allocation]
    [Defense96 - content checking]
    [Defense114 - control physical access]
    [Defense99 - deceptions]
    [Defense72 - detailed audit]
    [Defense3 - detect waste examination]
    [Defense13 - detection before failure]
    [Defense18 - encryption]
    [Defense139 - environmental controls]
    [Defense71 - Faraday boxes]
    [Defense21 - fault isolation]
    [Defense6 - feeding false information]
    [Defense138 - filtering devices]
    [Defense65 - increased or enhanced perimeters]
    [Defense119 - individual accountability for all assets and actions]
    [Defense74 - information flow controls]
    [Defense89 - integrity checking]
    [Defense31 - misuse detection]
    [Defense66 - noise injection]
    [Defense22 - out-of-range detection]
    [Defense15 - physical security]
    [Defense77 - physical switches or shields on equipment and devices]
    [Defense112 - place equipment and supplies out of harms way]
    [Defense12 - properly prioritized resource usage]
    [Defense104 - protection of data used in system testing]
    [Defense16 - redundancy]
    [Defense140 - searches and inspections]
    [Defense51 - secure design]
    [Defense83 - secure or trusted channels]
    [Defense4 - sensors]
    [Defense117 - suppression of incomplete, erroneous, or obsolete data]
    [Defense64 - tempest protection]
    [Defense2 - waste data destruction]