Focused On Your Success
The All.Net Security Database
Generated Fri Jun 27 09:58:56 PDT 2003 by fc@red.a.net
Cause/Mechanism:
Threat Profiles
Attack Methods
Defense Methods
Process:
Prevention
Detection
Reaction
Impact:
Integrity
Availability
Confidential
Use Control
Other:
Risk Management
Database Description
Domain:
Physical
Informational
Systemic
Sophistication:
Theoretical
Demonstrated
Widespread
Perspectives:
Management
Policy
Standards
Procedures
Documentation
Audit
Testing
Technical Safeguards
Personnel
Incident Handling
Legal
Physical
Awareness
Training
Education
Organization
Brekne's Mechanistic:
Input
Output
Storage
Processing
Transmission
Brekne's Causal:
Accidental
Malicious
Brekne's Method:
Leakage
Masquerade
Denial
Corruption
Usage
Mental
Threat7:
Name:Fraudsters
People who defraud others. (
e.g., On-Line-Securities-Fraud
)
Complexity: Throughout the centuries, people have perpetrated frauds of all sorts in order to gain through taking advantage of others.
fc@red.a.net
Related Database Material
[Attack30 - bribes and extortion]
[Attack3 - cable cuts]
[Attack62 - call forwarding fakery]
[Attack88 - collaborative misuse]
[Attack91 - combinations and sequences]
[Attack58 - content-based attacks]
[Attack56 - data aggregation]
[Attack48 - data diddling]
[Attack82 - dependency analysis and exploitation]
[Attack73 - distributed coordinated attacks]
[Attack17 - dumpster diving]
[Attack11 - environmental control loss]
[Attack1 - errors and omissions]
[Attack18 - fictitious people]
[Attack41 - implied trust exploitation]
[Attack35 - inadequate notice exploitation]
[Attack69 - induced stress failures]
[Attack92 - kiting]
[Attack74 - man-in-the-middle]
[Attack39 - modeling mismatches]
[Attack27 - modification in transit]
[Attack26 - observation in transit]
[Attack85 - peer relationship exploitation]
[Attack21 - perception management a.k.a. human engineering]
[Attack57 - process bypassing]
[Attack81 - reflexive control]
[Attack76 - replay attacks]
[Attack94 - repudiation]
[Attack65 - residual data gathering]
[Attack20 - resource availability manipulation]
[Attack93 - salami attacks]
[Attack22 - spoofing and masquerading]
[Attack90 - strategic or tactical deceptions]
[Attack16 - Trojan horses]