Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:56 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Threat9:
Name:whistle blowers
People who believe that crimes are being committed and that they have a duty to report them to the proper authorities.
Complexity: Whistle blowers are often sincere in their beliefs, have insider access, and sometimes have legitimate cases.
fc@red.a.net
Related Database Material
[Attack59 - backup theft, corruption, or destruction]
[Attack88 - collaborative misuse]
[Attack56 - data aggregation]
[Attack17 - dumpster diving]
[Attack43 - emergency procedure exploitation]
[Attack1 - errors and omissions]
[Attack41 - implied trust exploitation]
[Attack86 - inappropriate defaults]
[Attack24 - infrastructure observation]
[Attack26 - observation in transit]
[Attack51 - PBX bugging]
[Attack66 - privileged program misuse]
[Attack19 - protection missetting exploitation]
[Attack53 - repair-replace-remove information]
[Attack65 - residual data gathering]
[Attack55 - shoulder surfing]
[Attack54 - wire closet attacks]