All Resources

AC-CCITT
AES
AccessControl
AccessControlModel
Accountability
ActiveAttack
ActiveHardwareMisuse
ActiveIntrusionDetectionSystem
AdHocNetwork
AnomalyDetectionSystem
Anonymity
Anti-VirusSoftware
ApplicationLayerPacket
ApplicationLevelGateway
Asset
AssetLifeCyclePhase
AtCompileTime
AtLoadTime
AtRuntime
AtWriteTime
Attack
Auditing
Authentication
AuthenticationGoals
Authenticity
Authorisation
Availability
Backdoor
Backup
BackupFile
Bacteria
BastionHost
Behaviour-BasedIntrusionDetectionSystem
BehaviouralBiometricCredential
BehaviouralBiometricRecognition
BiometricAuthenticationSystem
BiometricToken
BlockCipher
Blowfish
BruteForceAttack
BufferOverflow
ByAuditSourceLocation
ByBehaviourOnDetection
ByDetectionMethod
ByUsageFrequency
BypassingIntendedControls
CBC-MAC
CPU
CachePoisoning
CertificateData
Checksum
ChecksumAlgorithm
ChecksumData
CircuitLevelGateway
ClientHost
CodeInjection
CodeSigning
Compartmentalisation
Confidentiality
ConfidentialityGoals
ConfigurationFile
ContinuousIntrusionDetectionSystem
Cookie
Correction
Correctness
Countermeasure
CountermeasureProtectsGoalOfAssetThroughType
Credential
CrossSiteScripting
CryptographicHashFunction
Cryptography
CryptographyModel
DBAccessControl
DBMS
DES
DNSHacking
DNSSEC
DNSServerCompromising
DNSSpoofing
DSA
Damage
Data
DataInTransit
DataOnNon-VolatileMedia
DataOnVolatileMedia
Database
DatabaseDataFile
Deception
DefaultPasswordUnchanged
DefenseStrategy
Deflection
Degausser
DenialOfService
Detection
Deterrence
DictionaryAttack
DiffieHellman
DigitalSignatureData
DigitalSigning
Disclosure
DiscreteLogarithm
DiscretionaryAccessControl
Disruption
DistributedDenialOfService
DoS-ICMP
DoS-TCP
Dongle
E-Mail
EMailFilter
Eavesdropping
Editor
ElGamalAlgorithm
ElGamalSignatureScheme
ElectronicToken
EllipticCurveCryptography
EllipticCurveDiscreteLogarithm
EmissionsSecurity
Encryption
EncryptionAlgorithm
EncryptionHardware
EncryptionKey
FacialPattern
FacialPatternRecognition
Factorisation
File
FileAccessControl
Fingerprint
FingerprintRecognition
Firefly
Firewall
Flooding
FormatStringAttack
FormatStringMisuse
Gait
GaitRecognition
Goal
GuessingAttack
HMAC
HTMLScriptInjection
HTTPData
HTTPS
HWDeveloper
HandMeasurement
HandMeasurementRecognition
Harddisk
Hardware
HasAsset
HasCountermeasure
HasGoal
HasMechanismType
HasThreat
Heap
HeapOverflow
Heat
HoneyPot
Host
Host-BasedIntrusionDetectionSystem
HostCompromising
HostOnInternet
HostOnIntranet
HostOnWiredNetwork
HostOnWirelessNetwork
Human
IPAddressSpoofing
IPPacket
IPSec
IPSplicing
Identification
Impersonation
InsecureDefaultSettingUnchanged
IntegerOverflow
Integrity
IntegrityGoals
InternetInfrastructureAttack
InternetInfrastructureDenialOfService
Intranet
IntrusionDetectionSystem
Iris
IrisRecognition
JavaSandbox
KEA
KLK05
KerberosArchitecture
KerberosAuthenticationProtocol
KeyExchange
KeyManagement
Keylogger
Keynote
Knowledge-BasedIntrusionDetectionSystem
Least-Privilege
LibertyFramework
LocalHost
LogMonitoring
Logging
LoginName
LoginSystem
MACAlgorithm
MD2
MD4
MD5
MOV97
MSPassport
MS_Word
MacOS
MalformedInput
MaliciousCode
ManInTheMiddle
MandatoryAccessControl
Masquerading
MemoryProtection
MessageAuthenticationCode
MessageAuthenticationCodeData
MessageDigest
MessageDigestData
MissingErrorHandling
MissingInputValidation
MisuseDetectionSystem
MisuseOfLanguageConstruct
Model
Monitoring
NAKAttack
NAT
NaryRelation
Network
Network-BasedIntrusionDetectionSystem
NetworkLayerPacket
NetworkedHost
Non-Repudiation
Oakley
OfficeUser
One-TimePassword
OnionRouter
OpenPGP
OperatingSystem
Overclocking
P3P
PHPInjection
PKI
PacketFilter
PacketMistreatment
PacketMistreatmentLink
PacketMistreatmentRouter
PassiveAttack
PassiveIntrusionDetectionSystem
Password
PasswordSniffing
PeriodicIntrusionDetectionSystem
Periodically
Phishing
PhysicalBiometricCredential
PhysicalBiometricRecognition
PhysicalThreat
PhysicalToken
PingOfDeath
PolicyCompliance
PolicyMaker
PowerMonitoringAttack
Prevention
Privacy
PrivateKey
PrivateUser
Process
Product
ProgramFile
ProgramSourceCodeFile
Public-KeyEncryption
PublicKey
RC4
RIPE-MAC
RIPE-MAC1
RIPE-MAC3
RIPE-MD-160
RSA
Rabbit
Rabbit-Worm
RaceCondition
RadiationMonitoring
Receiver
Recovery
ReferenceMonitor
Remailer
Replay
Retina
RetinaRecognition
Role-BasedAccessControl
Rootkit
Router
RoutingTablePoisoning
RoutingTablePoisoningThroughLink
RoutingTablePoisoningThroughRouter
S-HTTP
S-MIME
SAML
SHA-1
SQLInjection
SSH
SSL
SWDeveloper
Sanitizer
ScanningAttack
Scavenging
Sch96
Secrecy
SecureNetworkCommunication
SecurityHardware
Sender
ServerHost
SessionHijacking
ShellInjection
SideChannelAttack
SignatureAlgorithm
SigningWithCertificate
SigningWithX.509Certificate
SingleSignOnSystem
Skipjack
SmartCard
Smurf
Snort
SourceCodeAnalysis
SourceRoutingAttack
Spoofing
Spyware
Stack
StackAttack
StackOverflow
Standard
StatefulInspectionPacketFilter
StationaryData
StatisticalAttack
Steganography
StreamCipher
SwitchingOffFan
SymmetricAlgorithm
SymmetricKey
SystemAdministrator
SystemMapping
SystemModification
TCPPacket
TDES-EDE
TargetConnectedToNetwork
Technology
TechnologyMistakenlyUsedAsCountermeasure
Theft
Threat
ThreatThreatensGoalOfAsset
TimeOfCheckToTimeOfUse
TimingAttack
TinyFragmentAttack
TrafficAnalysis
TrafficPadding
TransportLayerPacket
TripleDES
Tripwire
TrojanHorse
Trust
TrustManagement
TrustedNetwork
UDPPacket
UnconnectedHost
Unix
UntrustedNetwork
UseOfVulnerableProgrammingLanguage
User
Usurpation
VPN
Virus
Voice
VoiceRecognition
Vulnerability
VulnerabilityInCode
VulnerabilityInConfiguration
VulnerabilityInUse
VulnerabilityScanner
VulnerableServiceStartsAutomatically
WindowAttack
Windows
WiredNetwork
WirelessAccessPoint
WirelessNetwork
Worm
X.509
X.509CertificateData
_2TDES
_3TDES
_Accountability
_AdHocNetwork
_Anonymity
_ApplicationLayerPacket
_Authentication
_Authenticity
_Authorisation
_Availability
_BackupFile
_BastionHost
_BehaviouralBiometricCredential
_BiometricToken
_CPU
_CertificateData
_ChecksumData
_ClientHost
_Confidentiality
_ConfidentialitySimilars
_ConfigurationFile
_Cookie
_Correction
_Correctness
_Credential
_Data
_DataInTransit
_DataOnNon-VolatileMedia
_DataOnVolatileMedia
_DatabaseDataFile
_Deflection
_Degausser
_Detection
_Deterrence
_DigitalSignatureData
_Dongle
_E-Mail
_ElectronicToken
_EncryptionHardware
_EncryptionKey
_FacialPattern
_File
_Fingerprint
_Gait
_HTTPData
_HandMeasurement
_Harddisk
_Hardware
_Heap
_Host
_HostOnInternet
_HostOnIntranet
_HostOnWiredNetwork
_HostOnWirelessNetwork
_Human
_IPPacket
_Identification
_Integrity
_Intranet
_Iris
_LocalHost
_LoginName
_MessageAuthenticationCodeData
_MessageDigestData
_Network
_NetworkLayerPacket
_NetworkedHost
_Non-Repudiation
_One-TimePassword
_Password
_PhysicalBiometricCredential
_PhysicalToken
_PolicyCompliance
_Prevention
_Privacy
_PrivateKey
_Process
_ProgramFile
_ProgramSourceCodeFile
_PublicKey
_Receiver
_Recovery
_Retina
_Router
_Secrecy
_SecurityHardware
_Sender
_ServerHost
_SmartCard
_Stack
_StationaryData
_SymmetricKey
_TCPPacket
_Technology
_TransportLayerPacket
_Trust
_TrustedNetwork
_UDPPacket
_UnconnectedHost
_UntrustedNetwork
_Voice
_WiredNetwork
_WirelessAccessPoint
_WirelessNetwork
_X.509CertificateData
assetHasVulnerability
containsControl
containsTechnology
credentialVerifiedBy
employedAt
enabledByVulnerability
enablesThreat
existsOnAsset
goalHasRelatedGoal
hasAsset
hasCountermeasure
hasGoal
hasMechanismType
hasStandardReference
hasThreat
hasUser
ifSuccessfulLeadsToThreat
implementsModel
isContainedIn
literature:AP03
literature:Bis03
literature:CCITT
literature:CM02
literature:DDW99
literature:Definition
literature:Gol99
literature:ISD
literature:LJ97
literature:Literature
literature:ODoC
literature:ODotI
literature:OED
literature:Pho02
literature:Shi94
literature:Szo05
literature:Webopedia
literature:Wikipedia
literature:hasDefinition
literature:hasQuotation
literature:hasSource
modelImplementedBy
protects
residesOn
runsOnOperatingSystem
supportedBy
supports
supportsCountermeasure
threatens
usedBy
uses
verifiesCredential
Generated with OWLDoc