Threat Cross Reference
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
activists
club initiates
competitors
consultants
crackers
crackers for hire
customers
cyber-gangs
deranged people
drug cartels
economic rivals
extortionists
foreign agents and spies
Fraudsters
global coalitions
government agencies
hackers
hoodlums
industrial espionage experts
information warriors
infrastructure warriors
insiders
maintenance people
military organizations
nation states
nature
organized crime
paramilitary groups
police
private investigators
professional thieves
reporters
terrorists
tiger teams
vandals
vendors
whistle blowers
Fri Jun 27 09:58:57 PDT 2003 fc