Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:56 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Threat22:
Name:organized crime
Organized groups of professional criminals. (
e.g., Tigers-of-Tamil
) (
e.g., Russian-Mob
) (
e.g., Mafia-Internet-Securities-Fraud
)
Complexity: These people tend to have money (but usually don't want to spend it on information system attacks), use physical threats to get what they want, and exploit human weaknesses.
fc@red.a.net
Related Database Material
[Attack52 - audio/video viewing]
[Attack68 - audit suppression]
[Attack59 - backup theft, corruption, or destruction]
[Attack30 - bribes and extortion]
[Attack3 - cable cuts]
[Attack88 - collaborative misuse]
[Attack43 - emergency procedure exploitation]
[Attack11 - environmental control loss]
[Attack67 - error-induced mis-operation]
[Attack71 - false updates]
[Attack18 - fictitious people]
[Attack31 - get a job]
[Attack23 - infrastructure interference]
[Attack27 - modification in transit]
[Attack72 - network service and protocol attacks]
[Attack90 - strategic or tactical deceptions]
[Attack51 - PBX bugging]
[Attack85 - peer relationship exploitation]
[Attack21 - perception management a.k.a. human engineering]
[Attack2 - power failure]
[Attack53 - repair-replace-remove information]
[Attack65 - residual data gathering]
[Attack22 - spoofing and masquerading]
[Attack13 - system maintenance]
[Attack16 - Trojan horses]
[Attack47 - viruses]
[Attack54 - wire closet attacks]