Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:52 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Defense140:
Name:searches and inspections
Physical, electronic, sonic, and other searches and inspections designed to reveal the presence of illicit devices or tampering.
Complexity: This activity is typified by manual labor augmented with various special-purpose devices.
fc@red.a.net
Related Database Material
[PDRDetect - Relates to Detect]
[PDRReact - Relates to React]
[PDRIntegrity - Relates to Integrity]
[PDRAvailability - Relates to Availability]
[PDRConfidentiality - Relates to Confidentiality]
[PDRWidespread - Relates to Widespread]
[PLSPhysical - Relates to Physical]
[ManAlManagement - Relates to Management]
[ManAlPolicy - Relates to Policy]
[ManAlStandards - Relates to Standards]
[ManAlProcedures - Relates to Procedures]
[ManAlDocumentation - Relates to Documentation]
[ManAlAudit - Relates to Audit]
[ManAlTesting - Relates to Testing]
[ManAlSafeguards - Relates to Safeguards]
[ManAlPersonnel - Relates to Personnel]
[ManAlIncident - Relates to Incident]
[ManAlLegal - Relates to Legal]
[ManAlPhysical - Relates to Physical]
[ManAlOrganization - Relates to Organization]
[Attack54 - wire closet attacks]
[Attack58 - content-based attacks]
[Attack59 - backup theft, corruption, or destruction]
[Attack62 - call forwarding fakery]
[Attack64 - illegal value insertion]
[Attack66 - privileged program misuse]
[Attack80 - error insertion and analysis]
[Attack85 - peer relationship exploitation]
[Attack86 - inappropriate defaults]
[Attack87 - piggybacking]
[Attack88 - collaborative misuse]
[Attack94 - repudiation]