Ami-sec risk Assessment & System Requirements


Coverage of Audit Threats



Yüklə 1,35 Mb.
səhifə20/30
tarix28.10.2017
ölçüsü1,35 Mb.
#17655
1   ...   16   17   18   19   20   21   22   23   ...   30

Coverage of Audit Threats





Threats

Objectives

T.Audit.1

O.Audit_Log_Maintenance

O.Import_Export_Control

O.Maintain_Online


T.Audit.2

O.Audit_Log_Maintenance

O.Import_Export_Control

O.Maintain_Online


T.Audit.3

O.Audit_Log_Maintenance

O.Import_Export_Control

O.Maintain_Online


T.Audit.4

O.Audit

O.Confidentiality

O.Import_Export_Control

O.I&A


O.Maintain_Online

O.Attr_based_Policy



T.Audit.5

O.Audit

O.Confidentiality

O.Import_Export_Control

O.Maintain_Online

O.Attr_based_Policy


T.Audit.6

O.Audit

O.Import_Export_Control

O.Maintain_Online

O.Attr_based_Policy



T.Audit.7

O.Audit

O.Audit_Log_Maintenance

O.Import_Export_Control

O.I&A


O.Maintain_Online

O.Attr_based_Policy



T.Audit.8

O.Audit

O.Import_Export_Control

O.Maintain_Online

OE.Admin_Guidance



T.Audit.9

O.Audit

O.Import_Export_Control

O.Maintain_Online

OE.Admin_Guidance



T.Audit.10

O.Audit

O.Import_Export_Control

O.Maintain_Online


T.Audit.11

O.Audit

O.Import_Export_Control

O.Maintain_Online




  • Coverage of Crypto Threats





    Threats

    Objectives

    T.Crypto.Break.1

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Crypto_Storage


    T.Crypto.Break.2

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Crypto_Storage


    T.Crypto.Invalid_Keys.1

    O.Trusted_Path&Channel

    O.Confidentiality

    OE.Crypto_Key_Man


    T.Crypto.Invalid_Keys.2

    O.Trusted_Path&Channel

    O.Confidentiality

    OE.Crypto_Key_Man


    T.Crypto.Weak_Keys.1

    O.Trusted_Path&Channel

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Crypto_Storage

    OE.Crypto_Key_Man




  • Coverage of Download Threats





    Threats

    Objectives

    T.Download.1

    O.Fault_Tolerant

    O.Import_Export_Control

    O.Integrity_Checks

    O.SW_Download



    T.Download.2

    O.Confidentiality

    O.Import_Export_Control

    O.Integrity_Checks

    O.SW_Download



    T.Download.3

    O.Import_Export_Control

    O.Integrity_Checks

    O.SW_Download


    T.Download.4

    O.Confidentiality

    O.Import_Export_Control

    O.Integrity_Checks

    O.SW_Download

    O.Comp_Attributes


    T.Download.5

    O.Import_Export_Control

    O.Integrity_Checks

    O.SW_Download




  • Coverage of Eavesdropping Threats





    Threats

    Objectives

    T.Eavesdrop.Apps.1

    O.Confidentiality

    O.Import_Export_Control



    T.Eavesdrop.Comm.1

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.Comm.2

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.Comm.3

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.Comm.4

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.Comm.5

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.Comm.6

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.Comm.7

    O.Confidentiality

    O.Crypto_Comm_Channel

    O.Import_Export_Control


    T.Eavesdrop.HMI.1

    O.Confidentiality

    O.Import_Export_Control

    O.Session_Protection


    T.Eavesdrop.HMI.2

    O.Confidentiality

    O.Session_Protection



    T.Eavesdrop.HMI.3

    O.Confidentiality

    O.Session_Protection



    T.Eavesdrop.HMI.4

    O.Security_Mgt

    O.Comp_Attributes

    OE.Physical_Security





  • Yüklə 1,35 Mb.

    Dostları ilə paylaş:
  • 1   ...   16   17   18   19   20   21   22   23   ...   30




    Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
    rəhbərliyinə müraciət

    gir | qeydiyyatdan keç
        Ana səhifə


    yükləyin