home *** CD-ROM | disk | FTP | other *** search
/ Secret & Below Interoperability (Unclassified) / Secret_and_Below_Interoperability_Version_1.0_Defense_Information_Systems_Agency_June_2000.iso / Mod02 / M02_03_02.swf / texts / 2.txt < prev    next >
Text File  |  2000-03-15  |  422b  |  13 lines

  1. Identify available attacks
  2. --- RECORDSEPARATOR ---
  3. Characterize each attack with respect to:
  4. --- RECORDSEPARATOR ---
  5.     -  Cost of the attack to the adversary
  6. --- RECORDSEPARATOR ---
  7.     -  Access required for the attack
  8. --- RECORDSEPARATOR ---
  9.     -  Risk incurred by the adversary
  10. --- RECORDSEPARATOR ---
  11.     -  Objective(s) accomplished by the adversary
  12. --- RECORDSEPARATOR ---
  13.     -  Impact(s) to mission accomplished