Focused On Your Success


The All.Net Security Database


Theoretical Cross Reference
Theoretical Cross Reference


Theoretical items are either very complex to do or require advanced knowledge and understanding. In some cases, nobody has demonstrated these or demonstrations have not been to the level where practical use is really available.

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • [Attack38 - device access exploitation]
    [Attack43 - emergency procedure exploitation]
    [Attack11 - environmental control loss]
    [Attack80 - error insertion and analysis]
    [Attack67 - error-induced mis-operation]
    [Attack70 - hardware failure - system flaw exploitation]
    [Attack15 - inadequate maintenance]
    [Attack83 - interprocess communication attacks]
    [Attack42 - interrupt sequence mishandling]
    [Attack46 - multiple error inducement]
    [Attack94 - repudiation]
    [Attack20 - resource availability manipulation]
    [Attack40 - simultaneous access exploitations]
    [Attack28 - sympathetic vibration]
    [Defense35 - awareness of implications]
    [Defense129 - democracy principle (GASSP)]
    [Defense60 - drop boxes and processors]
    [Defense34 - improved morality]
    [Defense127 - integration principle (GASSP)]
    [Defense86 - limited transitivity]
    [Defense25 - policies]
    [Defense12 - properly prioritized resource usage]
    [Defense23 - reintegration]
    [Defense26 - rerouting attacks]
    [Defense51 - secure design]
    [Defense133 - simplicity principle (GASSP)]
    [Defense27 - standards]
    [Defense20 - temporary blindness]
    [Defense97 - trusted system technologies]
    [Defense76 - effective protection mind-set]