General Threats

IdentifierAdmin_Err_Commit
Descriptive NameAdministrative errors of commission
DescriptionAn administrator commits errors that directly compromise organizational security objectives or change the technical security policy enforced by the system or application.
Selection GuidanceExamples of possible administrator errors include entry of erroneous data, erroneous software executions, and careless use of output devices.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Adm_Err_Crypto - Accidental mismanagement of cryptographic functions
Admin_Err_AC_Policy - Administrator error modifies access control or information flow policy
Admin_Err_Audit - Administrator error changes audit behavior
Admin_Err_Authentic - Administrator error modifies authentication enforcement
Admin_Err_Info - Administrator error makes information unavailable
Admin_Err_Resource - Administrator error makes resource unavailable
Admin_Err_Sys_Entry - Administrator error modifies entry policy
Admin_Err_User_Attr - Administrator error modifies user security attributes

IdentifierAdmin_Err_Omit
Descriptive NameAdministrative errors of omission
DescriptionThe system administrator fails to perform some function essential to security.
Selection GuidanceThis threat is especially important in systems where administration of security functions is largely manual, and in organizations where system administrators are not well trained or have other responsibilities that are not related to security.
For example, the system administrator does not update system configurations or user account information to reflect current policies, assigned privileges, or user authorizations.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Adm_Err_Crypto - Accidental mismanagement of cryptographic functions
Adm_Misconfig_User - User privileges and/or authorizations are not updated upon reassignment
Admin_Err_Omit_Trap - Back door left open
Admin_Err_Update - Administrator fails to update security configuration

IdentifierAdmin_Hostile_Modify
Descriptive NameHostile administrator modification of user or system data
DescriptionAn administrator maliciously obstructs organizational security objectives or modifies the system's configuration to allow security violations to occur.
Selection GuidanceThis threat is relevant in environments where not all administrators are fully trustworthy and/or are able to make mistakes that could jeopardize security.
Security violations include both direct abuse of privilege (e.g. deleting user files) and administrative actions that allow violations of the intended security policy (e.g., incorrectly changing user attributes).
Coverage RationaleThe detailed attacks are based on an enumeration of security services from part 2 of the CC.  If the PP includes additional security services, then the coverage is incomplete.  In the likely case that the PP does not include all security functions from Part 2 of the CC, some attacks will be irrelevant and should be ignored.
EditorialSeparation. This attack is unique in the fact that administrators have very open ability to effect most or any thing within the TSC. Therefore different and unique safeguards may be necessary to automate security functions to prevent the possible administrator's attacks.
Attacks may be grouped in various ways.  The following grouping is a synthesis from the TnC material and the resulting new taxonomy.
     Availability
          Unauthorized Modification of TSF Data
          User Security Attributes set to Obstruct Legitimate User ...
     Confidentiality
          System Administrator Steals User Data
     Integrity
          Modification of Audit Data and Attributes
          Destruction or Modification of Audit Data
     Security Protection
          Inappropriate Modification of Audit Attributes
          Modification of Audit Data and Attributes
          Modification of TSF Code or Data
          Destruction or modification of Audit Data -- done
          Unauthorized Modification of TSF Data
                  of object security attributes -- sort of done

Implementing Detailed Attacks
Adm_Hstl_Audit_Dstr - Destruction or modification of audit data
Adm_Hstl_Mod_Data_AC - Administrator maliciously modifies or deletes data access control attributes
Adm_Hstl_Mod_DataAps - Administrator modifies or destroys user data or applications
Adm_Hstl_Mod_IFC - The administrator maliciously modifies information flow control.
Adm_Hstl_Mod_SEP - Administrator maliciously modifies system entry parameters
Adm_Hstl_Mod_TSFCode - Administrator maliciously modifies security-critical code
Adm_Hstl_Mod_USB - Administrator maliciously modifies user/subject bindings
Adm_Hstl_Mod_UsrAttr - Administrator maliciously modifies user attributes and/or roles

IdentifierAdmin_UserPriv
Descriptive NameAdministrator violates user privacy policy
DescriptionAn administrator learns the identity (or other privacy related information) of user(s) in violation of user privacy policy. Privacy-related information is sensitive information associated with the identity of a user.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
Admin_UserPriv_Agg - Administrator aggregates privacy information
Admin_UserPriv_Col - Administrator reads collected user privacy information
Admin_UserPriv_Gen - Administrator reads system generated privacy information

IdentifierComponent_Failure
Descriptive NameA critical system component fails
DescriptionFailure of one or more system components results in the loss of system-critical functionality.
Selection GuidanceThis threat is relevant when there are components that may fail due to hardware and/or software imperfections and when the availability of system functionality is important.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Ext_Crypto_Failure - Failure of external crypto support functions
Hardware_Flaw - System hardware fails during system operation
Phys_CompFail_Res - Resource depletion failure
Software_Flaw - System use uncovers an intrinsic software flaw in a critical system component
TSF_Err_Conf_Crypto - Accidental release of cryptographic assets due to TSF flaw or malfunction

IdentifierDev_Flawed_Code
Descriptive NameSoftware containing security-related flaws
DescriptionA system or applications developer delivers code that does not perform according to specifications or contains security flaws.
Selection GuidanceAn important special case of this threat is when the security flaws prevent the system's security mechanism (TSF) from adequately protecting itself.
Coverage Rationale
EditorialNote that component-flaws are treated separately.

Implementing Detailed Attacks
Dev_FC_Attr_Interp - Inconsistent interpretation of audit data attributes
Dev_FC_Buff_Not_Clr - Buffers not cleared by the system
Dev_FC_Ctrl_Data - Incorrect modification of control data
Dev_FC_Data_Export - System data incorrectly exchanged
Dev_FC_Recovery - Non-secure recovery
Dev_FC_Replication - Inaccurate system-data replication
Dev_FC_Self_Protect - System modification by unauthorized source
Dev_FC_Trap_Door - Malicious developer creates secret trapdoor in system
Ext_Crypto_Failure - Failure of external crypto support functions

IdentifierFailure_DS_Comp
Descriptive NameFailure of a distributed system component
DescriptionFailure of a component that is part of a distributed system will cause other parts of the distributed system to malfunction or provide unreliable results.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
Failure_DS_Comm - Communications function failure

IdentifierHack_AC
Descriptive NameHacker undetected system access
DescriptionA hacker gains undetected access to a system due to missing, weak and/or incorrectly implemented access control causing potential violations of integrity, confidentiality, or availability.
Selection GuidanceImproper access can be gained via several methods. One example is a weak password mechanism that allows unintended system access.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_AC_Code_Vul - Hacker gains access through a vulnerability in code
Hack_AC_Weak - Weak system access control mechanism or system access control implementation

IdentifierHack_Avl_Resource
Descriptive NameHacker attempts resource denial of service
DescriptionA hacker executes commands, sends data, or performs other operations that make system resources unavailable to system users.  Resources that may be denied to users include bandwidth, processor time, memory, and data storage.
Selection GuidanceOne example of this threat is denial of service caused by hacker actions that disrupt the system's ability to manage its resources.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_Comm_Overload - Hacker causes overload of communication resources
Hack_Prcsr_Overload - Hacker causes system task overload resulting in denial of service
Hack_Stg_Overload - Hacker activities cause storage overload

IdentifierHack_Comm_Eavesdrop
Descriptive NameHacker eavesdrops on user data communications
DescriptionHacker obtains user data by eavesdropping on communications lines.
Selection GuidanceThis threat is relevant when the system must exchange user data with a remote system, and the confidentiality of that data is important.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_CommEaves_Eman - The communication mechanism emanates data
Hack_CommEaves_Intrc - Outsider intercepts user communications
Hack_CommEaves_Tap - An outsider taps a communications line

IdentifierHack_Crypto
Descriptive NameCryptoanalysis for theft of information
DescriptionA hacker performs cryptoanalysis on encrypted data in order to recover message content.
Selection Guidance
Coverage Rationale
EditorialThis threat could easily be broadened to include cryptoanalysis used for other purposes, e.g., to discover a signature key that allows forgery.

Implementing Detailed Attacks
Hack_Crypto_ChsnCy - Chosen ciphertext cryptoanalysis
Hack_Crypto_ChsnPln - Chosen plaintext cryptoanalysis
Hack_Crypto_ChsnTxt - Chosen text cryptoanalysis
Hack_Crypto_Cypher - Ciphertext-only cryptoanalysis
Hack_Crypto_PlnTxt - Known plaintext cryptoanalysis
Hack_Phys_Cnf_Eman - Hacker collects information via emanations analysis

IdentifierHack_Masq
Descriptive NameHacker masquerading as a legitimate user or as system process
DescriptionA hacker masquerades as an authorized user to perform operations that will be attributed to the authorized user or a system process.
Selection GuidanceMasquerade normally involves concealment of identity through false pretenses.  It often involves gaining access to a system under a false identity. This threat differs from a hostile insider's abuse of privilege in which a legitimate user takes unfair advantage of system weaknesses.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_Masq_Hijack - A hacker assumes the identity of an authorized user
Hack_Masq_Uwkstn - A user assumes the identity of an authorized user
Hack_Masq_Wauth - Masquerading due to weak authentication

IdentifierHack_Msg_Data
Descriptive NameMessage content modification
DescriptionA hacker modifies information intercepted from a communication link between two unsuspecting entities before passing it on, thereby deceiving the intended recipient.
Selection GuidanceThe communication link may be between two unrelated systems, between two parts of a distributed system, or between two users of a single system. The consequence of this threat is that the receiver will be receiving information other than that which was intended by the sender, namely information provided by the hacker.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_MsgData_RcvTSF - Modification of security-critical data in transit from a remote trusted site
Hack_MsgData_RcvUsr - Modification of user data in transit from a remote site
Hack_MsgData_SndTSF - Modification of security-critical data in transit to a remote site
Hack_MsgData_SndUsr - Modification of user data in transit to a remote site

IdentifierHack_Phys
Descriptive NameExploitation of vulnerabilities in the physical environment of the system
DescriptionA hacker physically interacts with the system to exploit vulnerabilities in the physical environment, resulting in arbitrary security compromises.
Selection GuidanceThe security compromises could include loss of availability, confidentiality, integrity, and/or security protection. For example, a hacker physically damages the IT system.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_Phys_Avl_Eman - Emissions interference
Hack_Phys_Cnf_Eman - Hacker collects information via emanations analysis
Hack_Phys_Crypto - Physical attack on cryptographic assets
Hack_Phys_Damage - Hacker physically attacks the system

IdentifierHack_Social_Engineer
Descriptive NameSocial engineering
DescriptionA hacker uses social engineering techniques to gain information about system entry, system use, system design, or system operation.
Selection GuidanceThis threat always exploits non-IT vulnerabilities, possibly in conjunction with IT vulnerabilities.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_SocEng_Password - Social engineering to steal password
Hack_SocEng_SysInfo - Hacker uses social engineering to learn system information

IdentifierMalicious_Code
Descriptive NameMalicious code exploitation
DescriptionAn authorized user, IT system, or hacker downloads and executes malicious code, which causes abnormal processes that violate the integrity, availability, or confidentiality of system assets.
Selection Guidance
Coverage RationaleAn authorized user, IT system, or hacker downloads an object either deliberately or accidentally.  The user does this primarily in order to gain assets that will assist in their job performance.  The IT system may do this to meet informational requirements.  The hacker may do this in an effort to satisfy destructive goals.  The malicious code is then executed via a trigger mechanism.  The trigger mechanism can be executed automatically after download, manually by the hacker, or unknowingly by the authorized user. The results of the attack affect the target system or any other system that the target system can influence.
EditorialSeparation. This attack is unique in the fact that administrators have very open ability to effect most or any thing within the TSC. Therefore different and unique safeguards may be necessary to automate security functions to prevent the possible administrator's attacks.
Attacks may be grouped in various ways.  The following grouping is a synthesis from the TnC material and the resulting new taxonomy.
     Availability
          Unauthorized Modification of TSF Data
          User Security Attributes set to Obstruct Legitimate User ...
     Confidentiality
          System Administrator Steals User Data
     Integrity
          Modification of Audit Data and Attributes
          Destruction or Modification of Audit Data
     Security Protection
          Inappropriate Modification of Audit Attributes
          Modification of Audit Data and Attributes
          Modification of TSF Code or Data
          Destruction or modification of Audit Data -- done
          Unauthorized Modification of TSF Data
                    of object security attributes -- sort of done

Implementing Detailed Attacks
Mal_Code_Hack_Downld - Malicious code perpetrator dissemination
Mal_Code_Hack_Exe - Malicious code perpetrator execution
Mal_Code_IT_Download - Malicious code accidental IT download
Mal_Code_IT_Exe - Malicious code IT execution
Mal_Code_Usr_Downld - Malicious code accidental user download
Mal_Code_Usr_Exe - Malicious code user execution

IdentifierPower_Disrupt
Descriptive NameUnexpected disruption of system or component power
DescriptionA human or environmental agent disrupts power causing the system to lose information or security protection.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
Power_Disrupt_Reset - Unexpected power reset

IdentifierRepudiate_Receive
Descriptive NameRecipient denies receiving information
DescriptionThe recipient of a message denies receiving the message, to avoid accountability for receiving the message or to avoid obligations incurred as a result of receiving the message.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
Repudiate_Rcvr_Int - Denial of having received data from another local user
Repudiate_Rcvr_Local - Denial of having received information from a remote user
Repudiate_Rcvr_Rem - Denial of having received information by a remote user

IdentifierRepudiate_Send
Descriptive NameSender denies sending information
DescriptionThe sender of a message denies sending the message to avoid accountability for sending the message or to avoid obligations incurred as a result of sending the message.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
Repudiate_Send_Int - Denial of having sent information to another local user
Repudiate_Send_Local - Denial of having sent information to a remote user
Repudiate_Send_Rem - Denial of having sent data by a remote user

IdentifierRepudiate_Transact
Descriptive NameA participant denies performing a transaction
DescriptionA participant in a transaction denies participation in the transaction to avoid accountability for the transaction or for resulting obligations.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
Repudiate_Trans_Loc - Circumvent non-repudiation in a transaction involving a user and a local system
Repudiate_Trans_Uloc - Circumvent non-repudiation in a transaction involving a local user and a remote system
Repudiate_Trans_Urem - Circumvent non-repudiation in a transaction involving a remote user and a local system

IdentifierSpoofing
Descriptive NameLegitimate system services are spoofed
DescriptionAn attacker tricks users into interacting with spurious system services.
Selection GuidanceThe attack method may involve writing software to spoof users or modifying message protocol information in transit.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_Spoof_Login - Login program replicated to capture authentication data
Hack_Spoof_MsgHdr - Attacker modifies protocol headers

IdentifierUser_Abuse_Conf
Descriptive NameHostile user acts cause confidentiality breaches
DescriptionA user collects sensitive or proprietary information and removes it from the system.
Selection GuidanceExamples include the following:
   * placing confidential information on a removable disk
   * transmitting data outside the organization.
Coverage Rationale
Editorial

Implementing Detailed Attacks
User_Abuse_Conf_Disk - User smuggles data using removable media
User_Abuse_Conf_Steg - Steganographic data smuggling

IdentifierUser_Collect
Descriptive NameUser abuses authorization to collect data
DescriptionUser abuses granted authorizations to improperly collect sensitive or security-critical data.
Selection GuidanceAn example of sensitive data is proprietary information. An example of security-critical data is user authentication data.
Coverage Rationale
Editorial

Implementing Detailed Attacks
User_Collect_Browse - User collects data by browsing
User_Collect_Deceive - User collects authentication data by deception
User_Collect_Deduce - User collects data by deduction
User_Collect_Eaves - User collects data by eavesdropping
User_Collect_Residue - User collects residual data

IdentifierUser_Err_Conf
Descriptive NameUser errors cause confidentiality breaches
DescriptionA user commits errors that cause information to be delivered to the wrong place or wrong person.
Selection GuidanceThis threat is a concern in any system that holds sensitive or classified information and has human users (including administrators). User errors include entry of erroneous data, erroneous software execution, and careless use of output devices.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_Ext_CryptoAsset - Accidental or deliberate mishandling of cryptographic assets external to the TOE
User_Err_Conf_Class - Under-classification of data sensitivity on export
User_Err_Conf_Crypto - Accidental release of cryptographic assets due to user error
User_Err_Conf_Exp - Confidentiality violation of export control policy

IdentifierUser_Err_Inaccess
Descriptive NameUser error makes data inaccessible
DescriptionA user accidentally deletes user data or changes system data rendering user data inaccessible.
Selection Guidance
Coverage Rationale
Editorial

Implementing Detailed Attacks
User_Err_Delete - User error deletes data
User_Err_Mod_Attr - User error modifying attributes availability
User_Err_Set_Attr - User error setting attributes availability

IdentifierUser_Err_Integrity
Descriptive NameUser errors cause integrity breaches
DescriptionA user commits errors that induce erroneous actions by the system and/or erroneous statements its users.
Selection GuidanceThis threat is a concern in any system that produces content-critical information and has human users (including administrators). User errors include entry of erroneous data, erroneous software execution (e.g., using uncertified software), and poor choices in the selection of available input data.
Coverage Rationale
Editorial

Implementing Detailed Attacks
Hack_Ext_CryptoAsset - Accidental or deliberate mishandling of cryptographic assets external to the TOE
User_Err_AttrXpt - Falsification of information quality in data export
User_Err_Data_Export - User accidentally releases incorrect information
User_Modify_Data - User improperly modifies user data

IdentifierUser_Err_Slf_Protect
Descriptive NameUser errors undermine the system's security features
DescriptionA user commits errors that cause the system or one of its applications to undermine the system's security features.
Selection GuidanceUser errors include entry of erroneous data (including security data), as well as erroneous software execution (e.g., running a program with incorrect privilege settings).
Coverage Rationale
Editorial

Implementing Detailed Attacks
User_Err_MsngAttrXpt - Failure to provide object security attributes in data export
User_Err_Object_Attr - Incorrectly set object attributes

IdentifierUser_Misuse_Avl_Resc
Descriptive NameUser's misuse causes denial of service
DescriptionA user's unauthorized use of resources causes an undue burden on an affected resource.
Selection GuidanceImproper use by a user is normally deliberate even though the attack results are generally accidental.  A user simply uses the capabilities of the TOE beyond set usage guidelines, possibly without understanding the attack ramifications.

Both this threat and T.User_Err_Inaccess deal with non-malicious loss of availability. This threat has been scoped to system resource availability. By contrast, T.User_Err_Inaccess includes threats to user file availability.
Coverage Rationale
EditorialThreat Source: The threat source would be a accidental human being that either is not following policy in efforts to complete action they feel are in the organization's best interest.
Attack Method: The attack method is to create multiple processes or data files in quantities that puts an undue strain on the systems or communication resources.
Results: The results are primarily reduction or denial in availability of resources to legitimate users and applications.
Separation:

Therefore, to scope this threat, the user's attitude in relation to the attack results is generally accidental in nature, their sophistication level as a threat agent is low, and their primary role is that of an application user even though they may have local administrative privileges.  Even though the user may have administrative privileges, to further scope this threat, administrative attacks will be left out and described in either the malicious or accidental administrator threats.

It is worth keeping the threats T.User_Misuse_Avl_Resc and T.User_Err_Inaccess separate because the countermeasures are distinct.

Implementing Detailed Attacks
User_Comm_Overload - User's unauthorized use causes overload of communication resources
User_ErrAvl_AudExhst - Denial of service due to exhausted audit storage
User_Obst_Res_Use - User obstructs legitimate use of resources.
User_Prcsr_Overload - User's unauthorized actions over-task the system causing processor overload
User_Stg_Overload - User's unauthorized actions cause storage overload

IdentifierUser_Modify
Descriptive NameUser abuses authorization to modify data
DescriptionA user abuses granted authorizations to improperly change or destroy sensitive or security-critical data.
Selection GuidanceAn example of sensitive data is proprietary information. An example of security-critical data is user authentication data.
Coverage Rationale
EditorialSource: Authorized user
Method: modify
Effect: loss of integrity, loss of availability, loss of security protection

Implementing Detailed Attacks
User_Modify_Audit - User modifies audit trail
User_Modify_Auth - User improperly modifies authentication data
User_Modify_Data - User improperly modifies user data
User_Modify_TSFData - User improperly modifies TSF data

IdentifierUser_Send
Descriptive NameUser abuses authorization to send data
DescriptionA user abuses granted authorizations to improperly send sensitive or security-critical data.
Selection GuidanceAn example of sensitive data is proprietary information. An example of security-critical data is user authentication data.
Coverage Rationale
EditorialSource: Authorized user
Method: send
Effect: loss of confidentiality, loss of integrity

Implementing Detailed Attacks
User_Abuse_Conf_Steg - Steganographic data smuggling
User_Send_Conf - User sends data violating confidentiality
User_Send_Integrity - User sends data violating integrity