0% found this document useful (0 votes)
779 views1 page

Threat Mind Map: Threat Landscape and Good Practice Guide For Internet Infrastructure

The document outlines various threats that could impact internet infrastructure. It categorizes threats as either disasters (natural disasters like earthquakes, floods, tsunamis; environmental disasters like pollution, dust; failures or disruptions of devices, systems, communication links, main supplies), lack of resources (human resources, processing power, network capacities, storage capabilities, physical resources like power, water, cooling), or other issues like physical attacks, fraud, theft, sabotage, and more. The mind map provides a comprehensive overview of potential threats that could negatively impact internet infrastructure operations.

Uploaded by

donnie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
779 views1 page

Threat Mind Map: Threat Landscape and Good Practice Guide For Internet Infrastructure

The document outlines various threats that could impact internet infrastructure. It categorizes threats as either disasters (natural disasters like earthquakes, floods, tsunamis; environmental disasters like pollution, dust; failures or disruptions of devices, systems, communication links, main supplies), lack of resources (human resources, processing power, network capacities, storage capabilities, physical resources like power, water, cooling), or other issues like physical attacks, fraud, theft, sabotage, and more. The mind map provides a comprehensive overview of potential threats that could negatively impact internet infrastructure operations.

Uploaded by

donnie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Threat Landscape and Good Practice Guide for Internet Infrastructure

Threat Mind Map Bombhattacks)threats Earthquakes


Frauds Floods
DivershmanipulatedhseahcablehinhEgypt Sabotage Tsunamis
Vandalisms Landslides
Devices Lightninghstrike
Naturalhdisasters
Storagehmedia Heavyhrains
Thefts Physicalhattacks
Cables Heavyhsnowfalls
Documents Heavyhwinds
Informationhleakages)sharing Wildfire
Disasters
Unauthorisedhphysicalhaccess)unauthorisedhentryhtohpremises Electromagnetichstorm
CoercionsDhextortionshorhcorruptions Fires
Briberies)corruptions Dangerourshradiationhleaks
Pollutions
Lackhofhhumanhresources Dusts
Environmentalhdisasters
Lackhofhprocessinghpower Corrosions
Lackhofhnetworkhcapacities Unfavourablehclimatichconditions
Lackhofhstoragehcapabilities Lackhofhresources Majorheventshinhthehenvironment
Power Explosions
Water Lackhofhphysicalhresources
Cooling
Fuelhexhaustions Outages
Powerhcut Losshofhpower Linecards
Failureshofhpartshofhdevices
Powerhsurges Connectors
Absencehofhpersonnel Networkhdevices
Strikes Failureshofhdeviceshorhsystems Servers
Losshofhsupporthservices Datahcenters
Coolinghoutages Cablehbreaks
FailureshorhdisruptionshofhcommunicationhlinkshBcommunicationhnetworksG
Networkhoutages Cablehcuts
Power
IdentityhthefthBidentityhfraud)accounthorhservice(sessionhhijackingG
Failureshorhdisruptionshofhmainhsupply Cooling
Unsolicitedhe(mail
Failures)Malfunctions Water
Viruses
FailureshofhdisruptionshofhservicehprovidershBsupplyhchainG
Worms
Failureshorhdisruptionshofhthehpowerhsupply
Trojans
Linecards
Rootkits Malfunctionshofhpartshofhdevices
Malwarehandhviruses Connectors
Botnets
Networkhdevices
Spyware
Malfunctionshofhdeviceshorhsystems Servers
Scareware
Datahcenters
Rogueware
Softwarehbugs
Adware
Potentiallyhunwantedhsoftware Configurationherrors Misconfigurations
Greyware
Abusehofhinformationhleakages
CompromisinghconfidentialhinformationhBdatahbreachesG
DigiNotar SSLhCAhinfiltration
Generationhandhusehofhroguehcertificates Informationhleakage)sharing
NationalhInformaticshCenterhBIndiaG ImproperlyhissuedhSSLhcertificates
Erroneoushusehorhadministrationhofhdeviceshandhsystems
Manipulationhofhhardwarehandhsoftware
Usinghinformationhfromhunreliablehsources
Falsificationhofhrecords
Unintentionalhchangeshofhdatahinhanhinformationhsystems
AddresshspacehhijackinghBIPhprefixesG Routinghtablehmanipulations
UnintentionalhdamageshBaccidentalG Inadequatehspecifications
DNShpoisoning DNShspoofing DNShmanipulations Manipulationhofhinformation Inadequatehusability
Falsificationhofhconfigurations
Inadequatehdesignshandhplanninghorhlackhofhadaptions InsecurehinterfaceshBAPIsG
AShhijacking Threats
AShmanipulation Policy)procedurehflaws
Misusehofhinformation)informationhsystems Designherrors
Abusehofhauthorizations
Abusehofhpersonalhdata
Unauthorisedhusehofhadministrationhofhdeviceshandhsystems
IMPIhProtocol
Unauthorisedhaccesshtohinformationhsystems)networks Internalhcases
DNShRegistrarhHijacking Damagehcausedhbyhahthirdhparty
Unauthorisedhactivities Externalhcases Shiphcollideshwithhcable
Unauthorisedhchangeshofhrecords
Damageshresultinghfromhpenetrationhtesting
Unauthorisedhinstallationhofhsoftware
Losshofhinformation
Unauthorisedhusehofhsoftware
LosshofhBintegrityhofGhsensitivehinformation
NTP
Sybilhattacks
DNS
Unfairhratings
SNMP
Playbooks
NetBios Nefarioushactivity)Abuse
Discriminations
SSDP
Losshofhreputation Collusions
CharGen
Amplification)reflection Proliferation
QOTD
Damage)LosshBIThassetsG Reputationhlaghexploitations
BitTorrent
Volume Re(entries
Kad
Valuehimbalancehexploitations
Steam
Devices
QuakehNetworkhProtocol
DenialhofhservicehattackshBDoS)DDoSG Storagehmedia
ZAvx Loss
Cables
Spoofing
Documents
UDP
DestructionhofhrecordsDhdeviceshorhstoragehmedia
ICMPhBPingG Flooding
Powerhsurges
Slowloris
Rats
PinghofhDeath
Wildlife Sharks
XDoS Applications
Mice
WinNuke
TCP(SYN
Protocolhexploitations
PushCAck
IPhaddresshoptions Malformedhpackethattacks
Largehscalehscans)probes Interceptionhcompromisinghemissions
Timescales
Targetedhattacks)advancedhpersistenththreats Nationhstatehespionage
Espionage
Pretexting)hoax Corporatehespionage
Interceptionhofhinformation
Spearhphishing Roguehhardware
Socialhengineering
Whaling Phishing Softwarehinterceptions
Eavesdropping)Interception)Hijacking Interferinghradiations
Baiting
Domainhnamehcollision Replayhofhmessages
Intendedhsimilarityhofhidentifiers
Typosquatting Routehleaks

RemotehactivitieshBexecutionG Manhinhthehmiddle)sessionhhijacking BGPhsessions

Kernelhflaws Networkhinjection

Designhflaws Repudiationhofhactions

Bufferhoverflows
Racehconditions Exploitationhofhsoftwarehbugs
SQLhinjections
Input
CrosshsitehscriptinghBXSSG Validation Violationhofhlawshorhregulations)breachhofhlegislation
Crosshsitehrequesthforgery Authentication Legal Judiciaryhdecisions)courthorders No(IPhMicrosofthdomainshseizure
Brutehforce Failurehtohmeethcontractualhrequirements

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy