Strategic Security Intelligence


The All.Net Security Database


Generated Wed May 5 16:25:34 PDT 1999 by fc@all

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Threat27:

    Name:police

    Complexity: These people often have powers of search and seizure, are usually poorly paid, wield guns, have powers of arrest, and in much of the world are easily corrupted. They tend to use physical means.
    fc@all

    Related Database Material

    [Attack52 - audio/video viewing]
    [Attack78 - breaking key management systems]
    [Attack91 - combinations and sequences]
    [Attack77 - cryptanalysis]
    [Attack56 - data aggregation]
    [Attack17 - dumpster diving]
    [Attack18 - fictitious people]
    [Attack31 - get a job]
    [Attack61 - hangup hooking]
    [Attack24 - infrastructure observation]
    [Attack74 - man-in-the-middle]
    [Attack39 - modeling mismatches]
    [Attack26 - observation in transit]
    [Attack32 - password guessing]
    [Attack51 - PBX bugging]
    [Attack85 - peer relationship exploitation]
    [Attack21 - perception management a.k.a. human engineering]
    [Attack87 - piggybacking]
    [Attack57 - process bypassing]
    [Attack81 - reflexive control]
    [Attack53 - repair-replace-remove information]
    [Attack65 - residual data gathering]
    [Attack55 - shoulder surfing]
    [Attack22 - spoofing and masquerading]
    [Attack13 - system maintenance]
    [Attack49 - van Eck bugging]
    [Attack54 - wire closet attacks]
    [Attack52 - audio/video viewing]
    [Attack78 - breaking key management systems]
    [Attack91 - combinations and sequences]
    [Attack77 - cryptanalysis]
    [Attack56 - data aggregation]
    [Attack17 - dumpster diving]
    [Attack18 - fictitious people]
    [Attack31 - get a job]
    [Attack61 - hangup hooking]
    [Attack24 - infrastructure observation]
    [Attack74 - man-in-the-middle]
    [Attack39 - modeling mismatches]
    [Attack26 - observation in transit]
    [Attack32 - password guessing]
    [Attack51 - PBX bugging]
    [Attack85 - peer relationship exploitation]
    [Attack21 - perception management a.k.a. human engineering]
    [Attack87 - piggybacking]
    [Attack57 - process bypassing]
    [Attack81 - reflexive control]
    [Attack53 - repair-replace-remove information]
    [Attack65 - residual data gathering]
    [Attack55 - shoulder surfing]
    [Attack22 - spoofing and masquerading]
    [Attack13 - system maintenance]
    [Attack49 - van Eck bugging]
    [Attack54 - wire closet attacks]