T.Eavesdrop.Apps.1
|
Medium
|
Unlikely
|
An entity eavesdrops on the Applications Interface (e.g. via logger process) in an attempt to read policy, information content, or information attributes information assets.
|
T.Eavesdrop.Comm.1
|
Medium
|
Likely
|
An entity eavesdrops on the Backhaul network in an attempt to read an information asset (e.g., in order to receive covert channel communications or perform traffic analysis).
|
T.Eavesdrop.Comm.2
|
Medium
|
Likely
|
An AMI entity eavesdrops on the AMI Virtual Network in an attempt to read an information asset (e.g., in order to receive covert channel communications or perform traffic analysis).
|
T.Eavesdrop.Comm.3
|
Low
|
Likely
|
An entity eavesdrops on the Policy Authority Interface in an attempt to read a policy, policy mechanism, or traffic flow information asset.
|
T.Eavesdrop.Comm.4
|
Medium
|
Likely
|
An entity eavesdrops on the AMI Systems Interface in an attempt to read information content, information attributes, policy, policy mechanism, or traffic flow information assets.
|
T.Eavesdrop.Comm.5
|
Medium
|
Likely
|
An entity eavesdrops on the non-AMI Systems Interface in an attempt to read information content, information attributes, or traffic flow information assets.
|
T.Eavesdrop.Comm.6
|
Low
|
Unlikely
|
An entity eavesdrops on the Download Source Interface in an attempt to diagnose AMI configuration and derive attacks on other AMI systems that weren’t upgraded yet.
|
T.Eavesdrop.Comm.7
|
High
|
Likely
|
An entity eavesdrops on the Key Management Systems Interface in an attempt to read policy, policy mechanisms, or traffic flow information assets.
|
T.Eavesdrop.HMI.1
|
Medium
|
Likely
|
An entity eavesdrops on the Users Interface (e.g. via a camera or a tap in the monitor cable) in an attempt to read policy, information content, or information attributes information assets.
|
T.Eavesdrop.HMI.2
|
Medium
|
Likely
|
A valid AMI user leaves the workstation unattended, does not logout, and leaves the AMI Token in the workstation. An entity sits at the unattended workstation and improperly accesses information assets.
|
T.Eavesdrop.HMI.3
|
Low
|
Unlikely
|
An entity sits at the unattended, inactive workstation, and attempts to access information assets.
|
T.Eavesdrop.HMI.4
|
Medium
|
Likely
|
An entity eavesdrops on the Users Interface because an authorized user viewed information assets in an unauthorized area.
|
|