Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:52 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Defense112:
Name:place equipment and supplies out of harms way
Physical isolation of key equipment and proper placement of all information and processing equipment is used to reduce accidental and intentional harm.
Complexity: This is not hard to do.
fc@red.a.net
Related Database Material
[PDRPrevent - Relates to Prevent]
[PDRIntegrity - Relates to Integrity]
[PDRAvailability - Relates to Availability]
[PDRConfidentiality - Relates to Confidentiality]
[PDRUse - Relates to Use]
[PDRWidespread - Relates to Widespread]
[PLSPhysical - Relates to Physical]
[ManAlStandards - Relates to Standards]
[ManAlProcedures - Relates to Procedures]
[ManAlPhysical - Relates to Physical]
[Attack1 - errors and omissions]
[Attack2 - power failure]
[Attack3 - cable cuts]
[Attack4 - fire]
[Attack6 - earth movement]
[Attack8 - volcanos]
[Attack10 - static]
[Attack12 - relocation]
[Attack13 - system maintenance]
[Attack15 - inadequate maintenance]
[Attack18 - fictitious people]
[Attack23 - infrastructure interference]
[Attack24 - infrastructure observation]
[Attack25 - insertion in transit]
[Attack26 - observation in transit]
[Attack27 - modification in transit]
[Attack31 - get a job]
[Attack43 - emergency procedure exploitation]
[Attack50 - electronic interference]
[Attack59 - backup theft, corruption, or destruction]
[Attack60 - restoration process corruption or misuse]
[Attack65 - residual data gathering]
[Attack67 - error-induced mis-operation]
[Attack78 - breaking key management systems]
[Attack80 - error insertion and analysis]
[Attack82 - dependency analysis and exploitation]