Ami-sec risk Assessment & System Requirements


Coverage of Flawed Implementation Threats



Yüklə 1,35 Mb.
səhifə21/30
tarix28.10.2017
ölçüsü1,35 Mb.
#17655
1   ...   17   18   19   20   21   22   23   24   ...   30

Coverage of Flawed Implementation Threats





Threats

Objectives

T.Flawed_Imp.Backdoor.1

O.Confidentiality

O.SW_Download

O.Malicious_Code

OE.Evaluated_System



T.Flawed_Imp.Developer.1

O.Confidentiality

O.SW_Download

O.Malicious_Code

OE.Evaluated_System



T.Flawed_Imp.Developer.2

O.SW_Download

O.Malicious_Code

OE.Evaluated_System


T.Flawed_Imp.Developer.3

O.Confidentiality

O.SW_Download

O.Malicious_Code

OE.Evaluated_System





  • Coverage of I&A Threats





    Threats

    Objectives

    T.Ident_Auth.1

    O.Confidentiality

    O.I&A


    T.Ident_Auth.2

    O.Confidentiality

    O.I&A


    T.Ident_Auth.3

    OE.Admin_Available

    T.Ident_Auth.4

    O.Confidentiality

    O.I&A


    T.Ident_Auth.5

    O.Confidentiality

    O.I&A


    T.Ident_Auth.6

    O.Confidentiality

    O.I&A


    T.Ident_Auth.7

    O.Confidentiality

    O.I&A


    T.Ident_Auth.8

    O.Confidentiality

    O.I&A







        1. Coverage of Information Systems Threats





          Threats

          Objectives

          T.InfoSys.1

          O.Confidentiality

          OE.Evaluated_System



          T.InfoSys.2

          O.Confidentiality

          O.Import_Export_Control

          O.I&A

          O.NonRepudiation



          T.InfoSys.Filter.1

          O.Confidentiality

          OE.Evaluated_System



          T.InfoSys.Printer.1

          O.Confidentiality

          O.User_Attributes

          OE.User_Guidance

          OE.Physical_Security





        2. Coverage of Initialization Threats





          Threats

          Objectives

          T.Initialize.Configuration.1

          O.Confidentiality

          OE.Trusted_Facility



          T.Initialize.Configuration.2

          O.Confidentiality

          OE.Trusted_Facility



          T.Initialize.Configuration.3

          O.Confidentiality

          O.SW_Download



          T.Initialize.Distribution.1

          O.Confidentiality

          O.Integrity_Checks

          O.SW_Download


          T.Initialize.Distribution.2

          O.Confidentiality

          O.Integrity_Checks

          O.SW_Download

          O.Malicious_Code





        3. Coverage of Insider Threats





          Threats

          Objectives

          T.Insider.Aggregation.1

          O.Audit

          O.Confidentiality

          O.User_Attributes


          T.Insider.Confusion.1

          O.Confidentiality

          O.Rollback



          T.Insider.Confusion.2

          O.Confidentiality

          O.Import_Export_Control



          T.Insider.Confusion.3

          O.Confidentiality

          O.Import_Export_Control

          O.Rollback


          T.Insider.Misinfo.1

          O.Import_Export_Control

          T.Insider.Mislabel.1

          O.Confidentiality

          O.Import_Export_Control



          T.Insider.Mislabel.2

          O.Confidentiality

          O.Import_Export_Control

          O.I&A


          T.Insider.Misuse.Info.1

          O.Confidentiality

          O.Import_Export_Control



          T.Insider.Misuse.Info.2

          O.Confidentiality

          OE.Physical_Security



          T.Insider.Misuse.Res.1

          O.Maintain_Online

          O.Priority_Of_Service

          O.Resource_Quotas





        4. Yüklə 1,35 Mb.

          Dostları ilə paylaş:
  • 1   ...   17   18   19   20   21   22   23   24   ...   30




    Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
    rəhbərliyinə müraciət

    gir | qeydiyyatdan keç
        Ana səhifə


    yükləyin