Threat Categories

IdentifierAdmin
Descriptive NameSystem administrator
DescriptionThis category covers installation, operation, maintenance, and replacement of the TOE.  It includes both well-intended and hostile administrators.
EditorialUndetermined:  whether this category should include application administrators as well as system administrators.

Subordinate Threats and Categories
T.Admin_Err_Commit - Administrative errors of commission
T.Admin_Err_Omit - Administrative errors of omission
T.Admin_Hostile_Modify - Hostile administrator modification of user or system data
T.Admin_UserPriv - Administrator violates user privacy policy
T.Malicious_Code - Malicious code exploitation
T.Spoofing - Legitimate system services are spoofed

IdentifierHacker
Descriptive NameMalicious unauthorized individual
DescriptionA hacker is generally considered to be an external unauthorized user. More generally, any individual who attempts to gain unauthorized access may be regarded as a hacker.  While a malicious insider may be covered under other categories such as Admin or User, it is also the case that malicious insiders are generally able to perform Hacker attacks.
Editorial

Subordinate Threats and Categories
T.Hack_AC - Hacker undetected system access
T.Hack_Avl_Resource - Hacker attempts resource denial of service
T.Hack_Comm_Eavesdrop - Hacker eavesdrops on user data communications
T.Hack_Crypto - Cryptoanalysis for theft of information
T.Hack_Masq - Hacker masquerading as a legitimate user or as system process
T.Hack_Msg_Data - Message content modification
T.Hack_Phys - Exploitation of vulnerabilities in the physical environment of the system
T.Hack_Social_Engineer - Social engineering
T.Malicious_Code - Malicious code exploitation
T.Spoofing - Legitimate system services are spoofed

IdentifierPhysical_Environment
Descriptive NameThe physical environment is the threat agent
DescriptionNatural Disasters and other entities that are not human or an IT device would fall into this category. This would include but not be limited to heat, cosmic rays, and other factors that might contribute to hardware aging.
Editorial

Subordinate Threats and Categories
T.Component_Failure - A critical system component fails
T.Power_Disrupt - Unexpected disruption of system or component power

IdentifierRoot
Descriptive NameThreats To Security
DescriptionAccidents, misuse and abuse that degrade the quality of the TOE.
EditorialThis category contains all other threat categories.

Subordinate Threats and Categories
TC.Admin - System administrator
TC.Hacker - Malicious unauthorized individual
TC.Physical_Environment - The physical environment is the threat agent
TC.System_Developer - System/TOE Developer
TC.System_HW_SW - System/Hardware/Software
TC.User - Authorized user

IdentifierSystem_Developer
Descriptive NameSystem/TOE Developer
DescriptionThe system developer is the organization or person responsible for the development of the target of evaluation (TOE).
EditorialPotentially, this includes not only designers, managers, implementers, and testers of the TOE, but potentially TOE evaluators, PP authors, as well.

Subordinate Threats and Categories
T.Component_Failure - A critical system component fails
T.Dev_Flawed_Code - Software containing security-related flaws

IdentifierSystem_HW_SW
Descriptive NameSystem/Hardware/Software
DescriptionThis category describes threats that are tightly bound to flaws or faults in a system's hardware, firmware, or software.
EditorialIT devices have to be programmed or tasked to complete an action.  However, an IT device acting responsibly and doing its prescribed job can propagate a threat (e.g. - a mail server transporting virus-infected email) and thus might be considered a colluding threat agent.

Subordinate Threats and Categories
T.Component_Failure - A critical system component fails
T.Failure_DS_Comp - Failure of a distributed system component
T.Malicious_Code - Malicious code exploitation
T.Power_Disrupt - Unexpected disruption of system or component power

IdentifierUser
Descriptive NameAuthorized user
DescriptionAuthorized users are the threat source for each threat.
Editorial

Subordinate Threats and Categories
T.Malicious_Code - Malicious code exploitation
T.Repudiate_Receive - Recipient denies receiving information
T.Repudiate_Send - Sender denies sending information
T.Repudiate_Transact - A participant denies performing a transaction
T.Spoofing - Legitimate system services are spoofed
T.User_Abuse_Conf - Hostile user acts cause confidentiality breaches
T.User_Collect - User abuses authorization to collect data
T.User_Err_Conf - User errors cause confidentiality breaches
T.User_Err_Inaccess - User error makes data inaccessible
T.User_Err_Integrity - User errors cause integrity breaches
T.User_Err_Slf_Protect - User errors undermine the system's security features
T.User_Misuse_Avl_Resc - User's misuse causes denial of service
T.User_Modify - User abuses authorization to modify data
T.User_Send - User abuses authorization to send data