Focused On Your Success


The All.Net Security Database


Generated Fri Jun 27 09:58:56 PDT 2003 by fc@red.a.net

Cause/Mechanism:
  • Threat Profiles
  • Attack Methods
  • Defense Methods
    Process:
  • Prevention
  • Detection
  • Reaction
    Impact:
  • Integrity
  • Availability
  • Confidential
  • Use Control
  • Other:
  • Risk Management
  • Database Description

    Domain:
  • Physical
  • Informational
  • Systemic
    Sophistication:
  • Theoretical
  • Demonstrated
  • Widespread
  • Perspectives:
  • Management
  • Policy
  • Standards
  • Procedures
  • Documentation
  • Audit
  • Testing
  • Technical Safeguards
  • Personnel
  • Incident Handling
  • Legal
  • Physical
  • Awareness
  • Training
  • Education
  • Organization
  • Brekne's Mechanistic:
  • Input
  • Output
  • Storage
  • Processing
  • Transmission
  • Brekne's Causal:
  • Accidental
  • Malicious
  • Brekne's Method:
  • Leakage
  • Masquerade
  • Denial
  • Corruption
  • Usage
  • Mental

  • Threat19:

    Name:activists

    Complexity: These people can be extremely zealous - even when they are misdirtected. They often consider one viewpoint to the exclusion of all others, try to maximize harm to their victim without regard to competitive issues or personal gains, and typically use physical means - sometimes with the additional element of publicity as part of their motive.
    fc@red.a.net

    Related Database Material

    [Attack52 - audio/video viewing]
    [Attack59 - backup theft, corruption, or destruction]
    [Attack3 - cable cuts]
    [Attack88 - collaborative misuse]
    [Attack91 - combinations and sequences]
    [Attack58 - content-based attacks]
    [Attack48 - data diddling]
    [Attack73 - distributed coordinated attacks]
    [Attack17 - dumpster diving]
    [Attack50 - electronic interference]
    [Attack43 - emergency procedure exploitation]
    [Attack11 - environmental control loss]
    [Attack67 - error-induced mis-operation]
    [Attack18 - fictitious people]
    [Attack4 - fire]
    [Attack5 - flood]
    [Attack64 - illegal value insertion]
    [Attack69 - induced stress failures]
    [Attack23 - infrastructure interference]
    [Attack63 - input overflow]
    [Attack25 - insertion in transit]
    [Attack33 - invalid values on calls]
    [Attack27 - modification in transit]
    [Attack72 - network service and protocol attacks]
    [Attack21 - perception management a.k.a. human engineering]
    [Attack87 - piggybacking]
    [Attack57 - process bypassing]
    [Attack20 - resource availability manipulation]
    [Attack22 - spoofing and masquerading]
    [Attack16 - Trojan horses]
    [Attack47 - viruses]
    [Attack54 - wire closet attacks]