Strategic Security Intelligence
The All.Net Security Database
Generated Wed May 5 16:25:34 PDT 1999 by fc@all
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Threat27:
Name:police
People tasked with enforcing laws.
Complexity: These people often have powers of search and seizure, are usually poorly paid, wield guns, have powers of arrest, and in much of the world are easily corrupted. They tend to use physical means.
fc@all
Related Database Material
[Attack52 - audio/video viewing]
[Attack78 - breaking key management systems]
[Attack91 - combinations and sequences]
[Attack77 - cryptanalysis]
[Attack56 - data aggregation]
[Attack17 - dumpster diving]
[Attack18 - fictitious people]
[Attack31 - get a job]
[Attack61 - hangup hooking]
[Attack24 - infrastructure observation]
[Attack74 - man-in-the-middle]
[Attack39 - modeling mismatches]
[Attack26 - observation in transit]
[Attack32 - password guessing]
[Attack51 - PBX bugging]
[Attack85 - peer relationship exploitation]
[Attack21 - perception management a.k.a. human engineering]
[Attack87 - piggybacking]
[Attack57 - process bypassing]
[Attack81 - reflexive control]
[Attack53 - repair-replace-remove information]
[Attack65 - residual data gathering]
[Attack55 - shoulder surfing]
[Attack22 - spoofing and masquerading]
[Attack13 - system maintenance]
[Attack49 - van Eck bugging]
[Attack54 - wire closet attacks]
[Attack52 - audio/video viewing]
[Attack78 - breaking key management systems]
[Attack91 - combinations and sequences]
[Attack77 - cryptanalysis]
[Attack56 - data aggregation]
[Attack17 - dumpster diving]
[Attack18 - fictitious people]
[Attack31 - get a job]
[Attack61 - hangup hooking]
[Attack24 - infrastructure observation]
[Attack74 - man-in-the-middle]
[Attack39 - modeling mismatches]
[Attack26 - observation in transit]
[Attack32 - password guessing]
[Attack51 - PBX bugging]
[Attack85 - peer relationship exploitation]
[Attack21 - perception management a.k.a. human engineering]
[Attack87 - piggybacking]
[Attack57 - process bypassing]
[Attack81 - reflexive control]
[Attack53 - repair-replace-remove information]
[Attack65 - residual data gathering]
[Attack55 - shoulder surfing]
[Attack22 - spoofing and masquerading]
[Attack13 - system maintenance]
[Attack49 - van Eck bugging]
[Attack54 - wire closet attacks]