Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:52 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Defense71:

    Name:Faraday boxes

    Complexity: The only complexity involved in the design of Faraday cages comes from determining the frequency range to be protected and calculating the size of mesh required to eliminate the relevant signals. Some care must be taken to assure that the shielding is properly in place and fully effective.
    fc@red.a.net

    Related Database Material

    [PDRPrevent - Relates to Prevent]
    [PDRIntegrity - Relates to Integrity]
    [PDRAvailability - Relates to Availability]
    [PDRConfidentiality - Relates to Confidentiality]
    [PDRUse - Relates to Use]
    [PDRDemonstrated - Relates to Demonstrated]
    [PLSPhysical - Relates to Physical]
    [ManAlStandards - Relates to Standards]
    [ManAlSafeguards - Relates to Safeguards]
    [ManAlPhysical - Relates to Physical]
    [Attack7 - solar flares]
    [Attack23 - infrastructure interference]
    [Attack24 - infrastructure observation]
    [Attack26 - observation in transit]
    [Attack27 - modification in transit]
    [Attack37 - environment corruption]
    [Attack49 - van Eck bugging]
    [Attack50 - electronic interference]
    [Attack59 - backup theft, corruption, or destruction]
    [Attack80 - error insertion and analysis]