[Portions US Pat./Pat. Pend./ TRADE SECRET / Copyright (c) 1987-2024] {GET@18.219.255.63:58986} (Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) on exec.all.net) Responder
All.Net

This analysis begins with defenses methods you wish to consider. Each protective method has a ranking from 0 to 10, with 10 being the best implemented, and 0 meaning not to consider it in the analysis. Set the rankings for each defense of interest, then press the button at the bottom of the page to do the analysis.


Chinese walls Faraday boxes accountability
adversary principle (GASSP) alarms analysis of physical characteristics
anomaly detection audit analysis auditing
augmented authentication devices time or use variant authenticated information authentication of packets
authorization limitation automated protection checkers and setters awareness of implications
background checks biometrics capture and punishment
change management choice of location classifying information as to sensitivity
clear line of responsibility for protection compliance with laws and regulations concealed services
configuration management conservative resource allocation content checking
continuity principle (GASSP) control physical access deceptions
democracy principle (GASSP) detailed audit detect waste examination
detection before failure disable unsafe features disconnect maintenance access
document and information control procedures drop boxes and processors dynamic password change control
effective mandatory access control effective protection mind-set encrypted authentication
encryption environmental controls fault isolation
feeding false information filtering devices financial situation checking
fine-grained access control fire doors, fire walls, asbestos suits and similar fire-limiting items fire suppression equipment
good hiring practices hard-to-guess passwords human intervention after detection
improved morality increased or enhanced perimeters independent computer and tool use by auditors
independent control of audit information individual accountability for all assets and actions information flow controls
infrastructure-wide digging hotlines inspection of incoming and outgoing materials insurance
integration principle (GASSP) integrity checking integrity shells
internal control principle (GASSP) inventory control isolated sub-file-system areas
jamming known-attack scanning least privilege
legal agreements limited function limited sharing
limited transitivity lockouts locks
low building profile minimize traffic in work areas minimizing copies of sensitive information
misuse detection multi-person controls multi-version programming
multidisciplinary principle (GASSP) noise injection numbering and tracking all sensitive information
out-of-range detection over-damped protocols path diversity
perception management periodic reassessment periods processing and color changes
physical security physical switches or shields on equipment and devices place equipment and supplies out of harms way
policies procedures program change logs
properly prioritized resource usage protection of data used in system testing protection of names of resources
quad-tri-multi-angulation quotas redundancy
regular review of protection measures reintegration rerouting attacks
retaining confidentiality of security status information searches and inspections secure design
secure distribution secure key management secure or trusted channels
security marking and/or labeling sensors separation of duties
separation of equipment so as to limit damage from local events separation of function simplicity principle (GASSP)
spread spectrum standards standby equipment
strong change control suppression of incomplete, erroneous, or obsolete data tempest protection
temporary blindness testing time, location, function, and other similar access limitations
timeliness principle (GASSP) tracking, correlation, and analysis of incident reporting and response information training and awareness
traps trunk access restriction trusted applications
trusted repair teams trusted system technologies uninterruptable power supplies and motor generators
universal use of badges waste data destruction
Brought to you by Management Analytics from