General Threats | General Policy Statements | General Assumptions |
Detailed Attacks | Detailed Policy Statements |
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | System |
Attitude | Deliberate | Action | Destroy or falsify | Locations | TOE |
Motive | Hostile | Vulnerabilities | Inadequate protection of audit data | Security Functions | FAU |
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_IFC, DA.Adm_Hstl_Mod_SEP, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Audit, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.User_Collect_Deceive, DA.User_Err_AttrXpt, DA.User_Err_Object_Attr, DA.User_Modify_Audit
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | System, User Data |
Attitude | Deliberate | Action | Modify access control attributes | Locations | TOE |
Motive | Hostile | Vulnerabilities | Security Functions | FDP | |
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_SEP, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Hack_Masq_Uwkstn, DA.User_Collect_Deceive, DA.User_Err_AttrXpt, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability, Integrity |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Modification of user data or applications | Locations | TOE |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Info, DA.Admin_Err_Resource, DA.Admin_Err_User_Attr, DA.Hack_Masq_Uwkstn, DA.Hack_Prcsr_Overload, DA.User_Comm_Overload, DA.User_Err_AttrXpt, DA.User_Err_Data_Export, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_MsngAttrXpt, DA.User_Err_Set_Attr, DA.User_Modify_Data, DA.User_Obst_Res_Use, DA.User_Send_Integrity, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Any |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Modification of Information Flow Control | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | Results: Loss of integrity allowing unauthorized user to view the data and loss of availability where the user does not have availability to the data as it is sent to the wrong location. | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Audit_Dstr, DA.Adm_Hstl_Mod_Data_AC, DA.Adm_Hstl_Mod_DataAps, DA.Adm_Hstl_Mod_SEP, DA.Adm_Hstl_Mod_TSFCode, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Audit, DA.Admin_Err_Info, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Resource, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Admin_UserPriv_Agg, DA.Admin_UserPriv_Gen, DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_Prcsr_Overload, DA.Hack_Stg_Overload, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Deduce, DA.User_Collect_Eaves, DA.User_Collect_Residue, DA.User_Comm_Overload, DA.User_Err_AttrXpt, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_Data_Export, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Err_Set_Attr, DA.User_Modify_Audit, DA.User_Modify_Data, DA.User_Obst_Res_Use, DA.User_Prcsr_Overload, DA.User_Send_Conf, DA.User_Send_Integrity, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Modification of system entry parameters | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | Results: loss of security protection, potential loss of availability, confidentiality, and integrity due to actions that can be taken after unauthorized access is gained | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_Data_AC, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Audit, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Hack_Masq_Uwkstn, DA.User_Collect_Deceive, DA.User_Err_AttrXpt, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | System |
Attitude | Deliberate | Action | Modify TSF or system code | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | FPT | |
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_IFC, DA.Adm_Hstl_Mod_SEP, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.User_Collect_Deceive, DA.User_Err_AttrXpt, DA.User_Err_Object_Attr, DA.User_Modify_Audit
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Modification of user/subject binding | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | High | ||||
Localities | Any | Editorial | Result: Loss of object integrity and accountability | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Audit_Dstr, DA.Adm_Hstl_Mod_Data_AC, DA.Adm_Hstl_Mod_IFC, DA.Adm_Hstl_Mod_SEP, DA.Adm_Hstl_Mod_TSFCode, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_Err_Audit, DA.Admin_Err_Authentic, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Comm_Overload, DA.Hack_Crypto_ChsnCy, DA.Hack_Crypto_ChsnPln, DA.Hack_Crypto_ChsnTxt, DA.Hack_Crypto_PlnTxt, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_MsgData_SndTSF, DA.User_Collect_Deceive, DA.User_Err_AttrXpt, DA.User_Err_Object_Attr, DA.User_Modify_Audit
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Any |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Modification of user attributes and/or roles | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | Threat Results: Loss of availability if modification of the user's attributes causes inability for the user to perform authorized actions. Loss of integrity or confidentiality if a user is given unauthorized access to assets due to attributes or roles inappropriately given them. | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_Data_AC, DA.Adm_Hstl_Mod_DataAps, DA.Adm_Hstl_Mod_SEP, DA.Admin_Err_Audit, DA.Admin_Err_Info, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Resource, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.Admin_UserPriv_Gen, DA.Hack_Masq_Uwkstn, DA.Hack_Prcsr_Overload, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Eaves, DA.User_Comm_Overload, DA.User_Err_AttrXpt, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_Data_Export, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Err_Set_Attr, DA.User_Modify_Data, DA.User_Obst_Res_Use, DA.User_Prcsr_Overload, DA.User_Send_Conf, DA.User_Send_Integrity, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Loss_Types | Security Protection | |
Authentication | Privileged | Human_Role | IT Capabilities | System | |
Attitude | Accidental | Action | Locations | TOE | |
Motive | Negligent | Vulnerabilities | Security Functions | FDP | |
Sophistication | Zero | ||||
Localities | Any | Editorial | Effect: Loss of security protection | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.User_Err_AttrXpt, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | FAU | |
Sophistication | Zero | ||||
Localities | Any | Editorial | Effect: Loss of accountability, loss of integrity | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | |||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Audit, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Resource, DA.Admin_Err_User_Attr, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Inaction | Locations | TOE |
Motive | Constructive | Vulnerabilities | administrator frailty | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Audit, DA.Admin_Err_Sys_Entry, DA.Admin_Err_User_Attr, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Info, DA.Admin_Err_User_Attr, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Audit, DA.Admin_Err_Omit_Trap, DA.Admin_Err_User_Attr, DA.User_Err_Object_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability, Security Protection |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Admin_Err_Audit, DA.Admin_Err_Info, DA.Admin_Err_Omit_Trap, DA.Admin_Err_Resource, DA.Admin_Err_Sys_Entry, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Object_Attr, DA.User_Err_Set_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Aggregate user data | Locations | Any |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_IFC, DA.Adm_Hstl_Mod_UsrAttr, DA.Admin_UserPriv_Gen, DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Deduce, DA.User_Collect_Eaves, DA.User_Collect_Residue, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Observe system data | Locations | TOE |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Adm_Hstl_Mod_UsrAttr, DA.Hack_Masq_Uwkstn, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Eaves, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Loss_Types | ||
Authentication | Identified | Human_Role | IT Capabilities | ||
Attitude | Deliberate | Action | install trap door | Locations | |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | |||||
Localities | Any | Editorial | Threat Source: Developer, pre-deployment or operational phase Threat results: loss of TOE security protection Exploited vulnerabilities: developer frailty, inadequate product evaluation |
||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Masq_Uwkstn
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Maliciously circumvents access control through a code vulnerability | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | Results: Varies depending on the hackers actions after the break-in. | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Any |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Penetrate weak access control | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | Results: Vary depending on hacker actions after break-in. | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_Prcsr_Overload, DA.Hack_Stg_Overload, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Deduce, DA.User_Collect_Eaves, DA.User_Collect_Residue, DA.User_Comm_Overload, DA.User_Err_AttrXpt, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_Data_Export, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Err_Set_Attr, DA.User_Modify_Audit, DA.User_Modify_Data, DA.User_Obst_Res_Use, DA.User_Prcsr_Overload, DA.User_Send_Conf, DA.User_Send_Integrity, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability, Security Protection |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Excessively use communication resources | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Security Protection |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Cryptoanalysis | Locations | |
Motive | Hostile | Vulnerabilities | inadequate strength of function, inadequate separation of plaintext and ciphertext | Security Functions | |
Sophistication | High | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Crypto_ChsnPln, DA.Hack_Crypto_PlnTxt, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_MsgData_SndTSF, DA.Hack_Phys_Cnf_Eman
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Security Protection |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Cryptoanalysis | Locations | |
Motive | Hostile | Vulnerabilities | Inadequate strength of function, inadequate separation of plaintext and ciphertext | Security Functions | |
Sophistication | High | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Crypto_ChsnCy, DA.Hack_Crypto_PlnTxt, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_MsgData_SndTSF, DA.Hack_Phys_Cnf_Eman
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Security Protection |
Authentication | None | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Cryptoanalysis | Locations | |
Motive | Hostile | Vulnerabilities | Inadequate strength of function, inadequate separation of plaintext and ciphertext | Security Functions | |
Sophistication | High | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Crypto_ChsnCy, DA.Hack_Crypto_ChsnPln, DA.Hack_Crypto_PlnTxt, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_MsgData_SndTSF, DA.Hack_Phys_Cnf_Eman
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Loss_Types | Confidentiality | |
Authentication | None | Human_Role | IT Capabilities | ||
Attitude | Deliberate | Action | Cryptoanalysis | Locations | |
Motive | Hostile | Vulnerabilities | Inadequate strength of function | Security Functions | |
Sophistication | High | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Crypto_ChsnCy, DA.Hack_Crypto_ChsnPln, DA.Hack_Crypto_ChsnTxt, DA.Hack_Crypto_PlnTxt, DA.Hack_Masq_Hijack, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_Phys_Cnf_Eman
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Security Protection |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Cryptoanalysis | Locations | |
Motive | Hostile | Vulnerabilities | Inadequate strength of function, inadequate separation of plaintext and ciphertext | Security Functions | |
Sophistication | High | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Crypto_ChsnCy, DA.Hack_Crypto_ChsnPln, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.Hack_MsgData_SndTSF, DA.Hack_Phys_Cnf_Eman
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Loss_Types | Any | |
Authentication | None | Human_Role | IT Capabilities | ||
Attitude | Deliberate | Action | Penetrate a communications link | Locations | Any |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | High | ||||
Localities | Remote | Editorial | Threat source: a hacker with the opportunity to steal an active, remote session of an authorized user. Method: hacker physically interposes himself by cutting a communication link or by manipulating communications at an intermediate network node. Results: loss of confidentiality and integrity, erroneous accountability, denial of service to the session originator. |
||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_MsgData_RcvTSF, DA.Hack_MsgData_RcvUsr, DA.Hack_MsgData_SndTSF, DA.Hack_MsgData_SndUsr, DA.Hack_Phys_Cnf_Eman
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Any |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Usurp an active session on a workstation | Locations | |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Local | Editorial | Threat source: user with access to unattended, active workstation Results: loss of accountability, confidentiality, integrity |
||
Forces |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Any |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | exploiting weak authentication mechanisms | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | Results: Loss of integrity if the masquerader changes objects that they are not authorized to, Loss of availability if the masquerader deletes an object they should not have, Loss of confidentiality if the masquerader sees information they should not have. | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Loss_Types | Integrity, Security Protection | |
Authentication | None | Human_Role | IT Capabilities | System | |
Attitude | Deliberate | Action | Message modification | Locations | TOE |
Motive | Hostile | Vulnerabilities | Inadequate TSF data protection by the remote site and/or inadequate data validation by the TOE | Security Functions | |
Sophistication | High | ||||
Localities | Remote | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Masq_Hijack, DA.Hack_MsgData_RcvUsr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Message modification | Locations | TOE |
Motive | Hostile | Vulnerabilities | Inadequate user data protection by the remote site and/or inadequate data validation by the TOE | Security Functions | |
Sophistication | High | ||||
Localities | Remote | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity, Security Protection |
Authentication | None | Human_Role | No Duties | IT Capabilities | System |
Attitude | Deliberate | Action | Message modification | Locations | Environment |
Motive | Hostile | Vulnerabilities | Inadequate TSF data protection by the TOE and/or inadequate data validation by the remote site | Security Functions | |
Sophistication | High | ||||
Localities | Remote | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | None | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Message modification | Locations | Environment |
Motive | Hostile | Vulnerabilities | Inadequate user data protection by the TOE and/or inadequate data validation by the remote site | Security Functions | |
Sophistication | High | ||||
Localities | Remote | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Operation | Loss_Types | Availability | |
Authentication | None | Human_Role | IT Capabilities | Arbitrary Capability | |
Attitude | Accidental | Action | Electronic emissions | Locations | Environment |
Motive | Vulnerabilities | Security Functions | |||
Sophistication | Zero | ||||
Localities | Local | Editorial | |||
Forces | Emanations |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Emanations analysis | Locations | TOE |
Motive | Hostile | Vulnerabilities | Inadequate TSF protection | Security Functions | |
Sophistication | High | ||||
Localities | Remote | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Deliberate processor overload | Locations | |
Motive | Hostile | Vulnerabilities | System / Resource Utilization | Security Functions | |
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Masq_Uwkstn, DA.User_Comm_Overload, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr, DA.User_Obst_Res_Use, DA.User_Prcsr_Overload, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | Method: Repeatedly dumps data unwontedly into TOE data storage through processes that use storage space. | ||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Data hiding | Locations | |
Motive | Negligent | Vulnerabilities | Human frailty, inadequate data protection | Security Functions | |
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Conf_Class, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Observe | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Masq_Uwkstn, DA.User_Abuse_Conf_Steg, DA.User_Collect_Deceive, DA.User_Collect_Eaves, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Security Protection |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Deception | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Masq_Uwkstn, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Eaves, DA.User_Err_AttrXpt, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Read repeatedly | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Eaves, DA.User_Collect_Residue, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Observe | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_Masq_Uwkstn, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Observe residual data | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.User_Abuse_Conf_Steg, DA.User_Collect_Browse, DA.User_Collect_Deceive, DA.User_Collect_Deduce, DA.User_Collect_Eaves, DA.User_Err_Conf_Class, DA.User_Err_Conf_Exp, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Create excessive communication traffic | Locations | |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr, DA.User_Obst_Res_Use, DA.User_Prcsr_Overload, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity, Security Protection |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Misrepresentation of security attributes | Locations | |
Motive | Negligent | Vulnerabilities | Human ignorance or inattention, inadequate data labeling | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Data_Export, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Send_Integrity
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Falsification of security attributes | Locations | |
Motive | Negligent | Vulnerabilities | Human frailty, inadequate data protection | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Deliberate export | Locations | |
Motive | Negligent | Vulnerabilities | Human frailty, inadequate data protection | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Conf_Class, DA.User_Err_MsngAttrXpt, DA.User_Send_Conf
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Accidental | Action | Releasing false information | Locations | Any |
Motive | Constructive | Vulnerabilities | Human ignorance or inattention, inadequate data labeling | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_MsngAttrXpt
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Accidental | Action | Error | Locations | TOE |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | TOE |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Delete, DA.User_Err_Set_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Integrity |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Withholding of security-attribute information | Locations | |
Motive | Constructive | Vulnerabilities | Human frailty, inadequate data protection | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Data_Export
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Security Protection |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Setting object security attributes | Locations | |
Motive | Constructive | Vulnerabilities | Human ignorance or inattention, inadequate data labeling mechanism | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | Vulnerabilities: Human ignorance or inattention, inadequate data labeling mechanism, inadequate security documentation | ||
Forces |
Other Detailed Attacks Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Delete, DA.User_Err_Mod_Attr
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity, Security Protection |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Modify TSF data | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Hack_AC_Code_Vul, DA.Hack_AC_Weak, DA.Hack_Comm_Overload, DA.Hack_Masq_Uwkstn, DA.Hack_Masq_Wauth, DA.User_Collect_Deceive, DA.User_Err_AttrXpt, DA.User_Err_Data_Export, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Modify_Data, DA.User_Send_Integrity
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Loss_Types | Integrity, Security Protection | |
Authentication | Authenticated | Human_Role | IT Capabilities | ||
Attitude | Deliberate | Action | Modify TSF data | Locations | |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | |||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.Dev_FC_Trap_Door, DA.Hack_Masq_Uwkstn, DA.User_Err_AttrXpt, DA.User_Err_Data_Export, DA.User_Err_MsngAttrXpt, DA.User_Err_Object_Attr, DA.User_Modify_Data, DA.User_Send_Integrity
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Modify | Locations | Any |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_AttrXpt, DA.User_Err_Data_Export, DA.User_Err_MsngAttrXpt, DA.User_Send_Integrity
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Modify | Locations | TOE |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Comm_Overload, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr, DA.User_Prcsr_Overload, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | System |
Attitude | Accidental | Action | Obstruction / Overload | Locations | TOE |
Motive | Negligent | Vulnerabilities | System / Resource Utilization | Security Functions | |
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Comm_Overload, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr, DA.User_Obst_Res_Use, DA.User_Stg_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Accidental | Action | Send | Locations | TOE |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_Conf_Class, DA.User_Err_MsngAttrXpt
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Send | Locations | |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Err_AttrXpt, DA.User_Err_Data_Export, DA.User_Err_MsngAttrXpt
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Prevent Use of Storage by exploiting storage capacity limits | Locations | |
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other Detailed Attacks Suggested by Attributes
DA.User_Comm_Overload, DA.User_Err_Delete, DA.User_Err_Mod_Attr, DA.User_Err_Set_Attr, DA.User_Obst_Res_Use, DA.User_Prcsr_Overload
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other Detailed Policy Statements Suggested by Attributes
DP.Audit_Gen_User, DP.Audit_Generation, DP.Authority_Notify, DP.Change_Control_Users, DP.Config_Mgt_Plan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other Detailed Policy Statements Suggested by Attributes
DP.Admin_Security_Data, DP.Audit_Generation, DP.Authority_Notify, DP.Change_Control_Users, DP.Config_Mgt_Plan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other Detailed Policy Statements Suggested by Attributes
DP.Admin_Security_Data, DP.Audit_Gen_User, DP.Authority_Notify, DP.Change_Control_Users, DP.Config_Mgt_Plan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other Detailed Policy Statements Suggested by Attributes
DP.Admin_Security_Data, DP.Audit_Gen_User, DP.Audit_Generation, DP.Change_Control_Users, DP.Config_Mgt_Plan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other Detailed Policy Statements Suggested by Attributes
DP.Admin_Security_Data, DP.Audit_Gen_User, DP.Audit_Generation, DP.Authority_Notify, DP.Config_Mgt_Plan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other Detailed Policy Statements Suggested by Attributes
DP.Admin_Security_Data, DP.Audit_Gen_User, DP.Audit_Generation, DP.Authority_Notify, DP.Change_Control_Users
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Any | Editorial | |||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_to_Comms, A.Access_to_Passwords, A.Trusted_User, A.User_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Assumptions Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Trusted_User, A.User_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Admin_Docs, A.Admin_Errors, A.Admin_Virus_Check, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Password_Management, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Admin_Cor_Usr_Data, A.Admin_Docs, A.Admin_Virus_Check, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Password_Management, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Eavesdrop_by_Out, A.Password_Management, A.Peer, A.Remote_Access, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Admin_Docs, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Admin_Docs, A.Auth_Sys_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Trusted_User, A.User_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Coop_User, A.Trusted_User, A.User_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Assumptions Suggested by Attributes
A.Peer, A.Remote_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Admin_Cor_Usr_Data, A.Admin_Docs, A.Admin_Errors, A.Admin_Virus_Check, A.Auth_Sys_Admin, A.Competent_Admin, A.Coop_User, A.Dispose_User_Data, A.Eavesdrop_by_Out, A.Hostile_User, A.Negligent_Admin, A.No_Abuse_By_Admin, A.Outsider_Low, A.Outsider_Med, A.Password_Management, A.Peer, A.Phys_Acs_to_Out, A.Poor_Trained_Admin, A.Protect_From_Out, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Coop_User, A.Dispose_User_Data, A.Eavesdrop_by_Out, A.Outsider_Low, A.Outsider_Med, A.Password_Management, A.Peer, A.Phys_Acs_to_Out, A.Protect_From_Out, A.Remote_Access, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Admin_Cor_Usr_Data, A.Admin_Docs, A.Admin_Errors, A.Admin_Virus_Check, A.Auth_Sys_Admin, A.Competent_Admin, A.Coop_User, A.Dispose_User_Data, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Password_Management, A.Peer, A.Poor_Trained_Admin, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Admin_Docs, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | No non-null attributes received from SPARTA, so record is currently blank. | |||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Admin_Cor_Usr_Data, A.Admin_Docs, A.Admin_Errors, A.Admin_Virus_Check, A.Auth_Sys_Admin, A.Competent_Admin, A.Coop_User, A.Dispose_User_Data, A.Eavesdrop_by_Out, A.Hostile_Sys_Admin, A.Hostile_User, A.Negligent_Admin, A.No_Abuse_By_Admin, A.Outsider_Hi, A.Outsider_Low, A.Outsider_Med, A.Password_Management, A.Peer, A.Phys_Acs_to_Out, A.Poor_Trained_Admin, A.Prot_Against_Nature, A.Prot_Agnst_Pwr_Fail, A.Prot_of_Comm, A.Protect_From_Out, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | High | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_to_Comms, A.Eavesdrop_by_Out, A.Outsider_Low, A.Outsider_Med, A.Peer, A.Phys_Acs_to_Out, A.Protect_From_Out, A.Remote_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_to_Comms, A.Eavesdrop_by_Out, A.Peer, A.Phys_Acs_to_Out, A.Protect_From_Out, A.Remote_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_to_Comms, A.Eavesdrop_by_Out, A.Outsider_Low, A.Peer, A.Phys_Acs_to_Out, A.Protect_From_Out, A.Remote_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Eavesdrop_by_Out, A.Peer, A.Remote_Access, A.Trusted_User, A.User_Access, A.User_Mistakes, A.User_Virus_Scan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Assumptions Suggested by Attributes
A.Eavesdrop_by_Out, A.Remote_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_to_Comms, A.Protect_From_Out
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Admin_Docs, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Other | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces | Disaster |
Other General Assumptions Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Other | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces | Communications |
Other General Assumptions Suggested by Attributes
A.Prot_of_Comm
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Other | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces | Communications |
Other General Assumptions Suggested by Attributes
A.Prot_Agnst_Pwr_Fail
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_to_Comms, A.Phys_Acs_to_Out
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Assumptions Suggested by Attributes
A.Eavesdrop_by_Out, A.Peer
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Assumptions Suggested by Attributes
A.Eavesdrop_by_Out, A.Peer, A.Remote_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Admin_Docs, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Peer, A.Remote_Access, A.Remote_Admin, A.Trusted_User, A.User_Access, A.Well_Behaved_Admin
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.User_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Trusted_User
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Eavesdrop_by_Out, A.Password_Management, A.Peer, A.Remote_Access, A.Trusted_User, A.User_Access, A.User_Virus_Scan
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Acc_Ovrwrit_SysData, A.Acc_to_Comms, A.Access_to_Passwords, A.Eavesdrop_by_Out, A.Password_Management, A.Peer, A.Remote_Access, A.Trusted_User, A.User_Access, A.User_Mistakes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Well Behaved | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Assumptions Suggested by Attributes
A.Access_to_Passwords, A.Admin_Docs, A.Auth_Sys_Admin, A.Competent_Admin, A.Eavesdrop_by_Out, A.No_Abuse_By_Admin, A.Peer, A.Remote_Access, A.Remote_Admin, A.Review_Audit_Log, A.Trusted_User, A.User_Access
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Authorities
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | No Duties | IT Capabilities | |
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | Confidentiality | ||
Authentication | Human_Role | IT Capabilities | User Data | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities, P.Information_AC, P.Lifecycle, P.Marking, P.Physical_Control
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | Availability | ||
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities, P.Lifecycle, P.Physical_Control
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Development | Loss_Types | Security Protection |
Authentication | Human_Role | IT Capabilities | |||
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | AGD | |
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | Confidentiality | ||
Authentication | Human_Role | IT Capabilities | User Data | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities, P.Authorized_Use, P.Lifecycle, P.Marking, P.Physical_Control
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | Integrity | ||
Authentication | Human_Role | IT Capabilities | User Data | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities, P.Lifecycle, P.Physical_Control
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | |||
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | The policy is sufficiently broad, that virtually all attributes are relevant. | |||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities, P.Authorized_Use, P.Availability, P.Guidance, P.Information_AC, P.Integrity, P.Marking, P.Physical_Control
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Lifecycle_Phases | Loss_Types | Confidentiality | ||
Authentication | Human_Role | IT Capabilities | User Data | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities, P.Authorized_Use, P.Information_AC, P.Lifecycle, P.Physical_Control
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Human_Role | IT Capabilities | |||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | The policy is sufficiently broad that most attributes are relevant. | |||
Forces |
Other General Policy Statements Suggested by Attributes
P.Accountability, P.Authorities
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Admin_Err_Omit, T.User_Err_Conf, T.User_Err_Inaccess, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Misuse_Avl_Resc, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Admin_Err_Commit, T.User_Err_Conf, T.User_Err_Inaccess, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Misuse_Avl_Resc, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Deliberate | Action | Modify or destroy TSF code or data | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | Threat Source: The threat source would be a deliberate human being that either is not following policy in efforts to complete action they feel are in the organization's best interest or is malicious in intent. Attack Method: The attack method is to modify or destroy security attributes or security mechanisms that would allow effects that are contrary to the organization's security policy. Results: The results vary depending on the effect of the destruction or modification. Confidentiality, Integrity, and Availability can be effected |
|||
Forces |
Other General Threats Suggested by Attributes
T.Admin_Err_Commit, T.Admin_Err_Omit, T.Admin_UserPriv, T.Hack_Comm_Eavesdrop, T.Hack_Social_Engineer, T.Malicious_Code, T.Repudiate_Receive, T.Repudiate_Send, T.Repudiate_Transact, T.User_Abuse_Conf, T.User_Collect, T.User_Err_Conf, T.User_Err_Inaccess, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Misuse_Avl_Resc, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | User Data |
Attitude | Accidental | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | SPARTA didn't provide a result type here, but it seems clear that privacy is a kind of confidentiality. | |||
Forces |
Other General Threats Suggested by Attributes
T.Admin_Err_Commit, T.Admin_Err_Omit, T.User_Err_Conf, T.User_Err_Slf_Protect, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Other | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces | Unusual Conditions |
Other General Threats Suggested by Attributes
T.Failure_DS_Comp
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Development | Loss_Types | |
Authentication | Privileged | Human_Role | System Duties | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Other | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces | Unusual Conditions |
Other General Threats Suggested by Attributes
T.Component_Failure
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Avl_Resource, T.Hack_Comm_Eavesdrop, T.Hack_Crypto, T.Hack_Msg_Data, T.Hack_Phys, T.Hack_Social_Engineer, T.Malicious_Code, T.Repudiate_Receive, T.Repudiate_Send, T.Repudiate_Transact, T.Spoofing, T.User_Abuse_Conf, T.User_Collect, T.User_Err_Conf, T.User_Err_Inaccess, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Misuse_Avl_Resc, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | None | Human_Role | No Duties | IT Capabilities | System |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Phys, T.Hack_Social_Engineer, T.Malicious_Code, T.Spoofing
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | None | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Threats Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | None | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Comm_Eavesdrop, T.Spoofing
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability, Confidentiality, Integrity |
Authentication | None | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Inadequate authentication mechanisms and inadequate protection of communications media. | Security Functions | |
Sophistication | High | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Comm_Eavesdrop, T.Hack_Crypto, T.Hack_Msg_Data, T.Spoofing
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | None | Human_Role | No Duties | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Threats Suggested by Attributes
T.Spoofing
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Local | Editorial | |||
Forces |
Other General Threats Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Malicious_Code
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Social_Engineer
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Other | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Human_Role | IT Capabilities | System | ||
Attitude | Action | Locations | |||
Motive | Vulnerabilities | Security Functions | |||
Sophistication | |||||
Localities | Editorial | ||||
Forces | Power |
Other General Threats Suggested by Attributes
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Repudiate_Send, T.Repudiate_Transact, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Repudiate_Receive, T.Repudiate_Transact, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Negligent | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Repudiate_Receive, T.Repudiate_Send, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | None | Human_Role | No Duties | IT Capabilities | |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Moderate | ||||
Localities | Remote | Editorial | |||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Comm_Eavesdrop, T.Hack_Crypto, T.Hack_Msg_Data
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Deliberate | Action | Locations | ||
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Comm_Eavesdrop, T.Hack_Social_Engineer, T.Malicious_Code, T.User_Collect, T.User_Err_Conf, T.User_Err_Slf_Protect, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Deliberate | Action | Observe | Locations | |
Motive | Hostile | Vulnerabilities | Security Functions | ||
Sophistication | Low | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.Hack_Comm_Eavesdrop, T.Hack_Social_Engineer, T.Malicious_Code, T.User_Abuse_Conf, T.User_Err_Conf, T.User_Err_Slf_Protect, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Slf_Protect, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Accidental | Action | Error | Locations | |
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Slf_Protect
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Slf_Protect, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Conf, T.User_Err_Inaccess, T.User_Err_Integrity, T.User_Misuse_Avl_Resc, T.User_Modify, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Availability |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | System |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Slf_Protect
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Integrity |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Send
Agent Attributes | Method Attributes | Result Attributes | |||
Agent_Types | Human | Lifecycle_Phases | Operation | Loss_Types | Confidentiality, Integrity |
Authentication | Authenticated | Human_Role | Service User | IT Capabilities | User Data |
Attitude | Accidental | Action | Locations | ||
Motive | Constructive | Vulnerabilities | Security Functions | ||
Sophistication | Zero | ||||
Localities | Editorial | ||||
Forces |
Other General Threats Suggested by Attributes
T.User_Err_Conf, T.User_Err_Integrity, T.User_Err_Slf_Protect, T.User_Modify