Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:52 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Defense39:
Name:good hiring practices
Background checks, reference checks, and other similar hiring practices are used to verify that employees are likely to be loyal, upstanding, honest, and trustworthy.
Complexity: It's hard to do this right.
fc@red.a.net
Related Database Material
[PDRPrevent - Relates to Prevent]
[PDRIntegrity - Relates to Integrity]
[PDRConfidentiality - Relates to Confidentiality]
[PDRWidespread - Relates to Widespread]
[PLSSystemic - Relates to Systemic]
[ManAlManagement - Relates to Management]
[ManAlPolicy - Relates to Policy]
[ManAlStandards - Relates to Standards]
[ManAlProcedures - Relates to Procedures]
[ManAlDocumentation - Relates to Documentation]
[ManAlPersonnel - Relates to Personnel]
[ManAlAwareness - Relates to Awareness]
[ManAlTraining - Relates to Training]
[ManAlOrganization - Relates to Organization]
[Attack1 - errors and omissions]
[Attack18 - fictitious people]
[Attack23 - infrastructure interference]
[Attack30 - bribes and extortion]
[Attack31 - get a job]
[Attack78 - breaking key management systems]
[Attack88 - collaborative misuse]
[Attack90 - strategic or tactical deceptions]