Strategic Security Intelligence


The All.Net Security Database


Generated Wed May 5 16:25:34 PDT 1999 by fc@all

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Threat29:

    Name:infrastructure warriors

    Complexity: These groups typically have access to accurate weapons and high explosives, they are oriented toward causing serious physcial harm, often have the goal of causing permanent harm, do not hesitate to kill people, and act at the behest of governments, and with their full and open support.
    fc@all

    Related Database Material

    [Attack59 - backup theft, corruption, or destruction]
    [Attack3 - cable cuts]
    [Attack29 - cascade failures]
    [Attack91 - combinations and sequences]
    [Attack44 - desychronization and time-based attacks]
    [Attack73 - distributed coordinated attacks]
    [Attack6 - earth movement]
    [Attack50 - electronic interference]
    [Attack43 - emergency procedure exploitation]
    [Attack11 - environmental control loss]
    [Attack67 - error-induced mis-operation]
    [Attack4 - fire]
    [Attack5 - flood]
    [Attack69 - induced stress failures]
    [Attack23 - infrastructure interference]
    [Attack25 - insertion in transit]
    [Attack27 - modification in transit]
    [Attack72 - network service and protocol attacks]
    [Attack2 - power failure]
    [Attack81 - reflexive control]
    [Attack20 - resource availability manipulation]
    [Attack60 - restoration process corruption or misuse]
    [Attack28 - sympathetic vibration]
    [Attack16 - Trojan horses]
    [Attack54 - wire closet attacks]
    [Attack59 - backup theft, corruption, or destruction]
    [Attack3 - cable cuts]
    [Attack29 - cascade failures]
    [Attack91 - combinations and sequences]
    [Attack44 - desychronization and time-based attacks]
    [Attack73 - distributed coordinated attacks]
    [Attack6 - earth movement]
    [Attack50 - electronic interference]
    [Attack43 - emergency procedure exploitation]
    [Attack11 - environmental control loss]
    [Attack67 - error-induced mis-operation]
    [Attack4 - fire]
    [Attack5 - flood]
    [Attack69 - induced stress failures]
    [Attack23 - infrastructure interference]
    [Attack25 - insertion in transit]
    [Attack27 - modification in transit]
    [Attack72 - network service and protocol attacks]
    [Attack2 - power failure]
    [Attack81 - reflexive control]
    [Attack20 - resource availability manipulation]
    [Attack60 - restoration process corruption or misuse]
    [Attack28 - sympathetic vibration]
    [Attack16 - Trojan horses]
    [Attack54 - wire closet attacks]