Strategic Security Intelligence
The All.Net Security Database
Generated Wed May 5 16:25:34 PDT 1999 by fc@all
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Threat34:
Name:paramilitary groups
Privately-sponsored armed and organized groups.
Complexity: Paramilitary groups, malicias, and similar organizations tend to be poorly funded and oriented toward physcical destruction.
fc@all
Related Database Material
[Attack30 - bribes and extortion]
[Attack3 - cable cuts]
[Attack91 - combinations and sequences]
[Attack44 - desychronization and time-based attacks]
[Attack17 - dumpster diving]
[Attack50 - electronic interference]
[Attack43 - emergency procedure exploitation]
[Attack11 - environmental control loss]
[Attack67 - error-induced mis-operation]
[Attack4 - fire]
[Attack23 - infrastructure interference]
[Attack69 - induced stress failures]
[Attack2 - power failure]
[Attack20 - resource availability manipulation]
[Attack22 - spoofing and masquerading]
[Attack54 - wire closet attacks]
[Attack30 - bribes and extortion]
[Attack3 - cable cuts]
[Attack91 - combinations and sequences]
[Attack44 - desychronization and time-based attacks]
[Attack17 - dumpster diving]
[Attack50 - electronic interference]
[Attack43 - emergency procedure exploitation]
[Attack11 - environmental control loss]
[Attack67 - error-induced mis-operation]
[Attack4 - fire]
[Attack23 - infrastructure interference]
[Attack69 - induced stress failures]
[Attack2 - power failure]
[Attack20 - resource availability manipulation]
[Attack22 - spoofing and masquerading]
[Attack54 - wire closet attacks]