Focused On Your Success


The All.Net Security Database


Training Cross Reference
Training Cross Reference


Things that help people get trained.

For people with specific responsibilities for information protection, training in the proper way to carry out their duties is important to success. [Drill-Down] [Drill-Down]

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • [Defense35 - awareness of implications]
    [Defense57 - change management]
    [Defense105 - Chinese walls]
    [Defense49 - classifying information as to sensitivity]
    [Defense123 - compliance with laws and regulations]
    [Defense91 - conservative resource allocation]
    [Defense76 - effective protection mind-set]
    [Defense39 - good hiring practices]
    [Defense90 - infrastructure-wide digging hotlines]
    [Defense98 - perception management]
    [Defense36 - periodic reassessment]
    [Defense25 - policies]
    [Defense122 - protection of names of resources]
    [Defense16 - redundancy]
    [Defense101 - regular review of protection measures]
    [Defense133 - simplicity principle (GASSP)]
    [Defense27 - standards]
    [Defense52 - testing]
    [Defense24 - training and awareness]