T-1 | Alteration | U, P, E | Alteration of data, files, or records. | | Modification | |
T-2 | Audit Compromise | P | An unauthorized user gains access to the audit trail and couldcause audit records to be deleted or modified, or prevents futureaudit records from being recorded, thus masking a security relevantevent. Also applies to a purposeful act by an Administrator to maskunauthorized activity. | | Modification or Destruction | Unavailable Accurate Records |
T-3 | Bomb | P | An intentional explosion. | | Modification or Destruction | Denial of Service |
T-4 | Communications Failure | U, E | Cut of fiber optic lines, trees falling on telephone lines. | | | Denial of Service |
T-5 | Compromising Emanations | P | Eavesdropping can occur via electronic media directed againstlarge scale electronic facilities that do not process classifiedNational Security Information. | Disclosure | | |
T-6 | Cyber Brute Force | P | Unauthorized user could gain access to the information systemsby random or systematic guessing of passwords, possibly supportedby password cracking utilities. | Disclosure | Modification or Destruction | Denial of Service |
T-7 | Data Disclosure | P, U | An attacker uses techniques that could result in the disclosureof sensitive information by exploiting weaknesses in the design orconfiguration. Also used in instances where misconfiguration or thelack of a security control can lead to the unintentional disclosureof data. | Disclosure | | |
T-8 | Data Entry Error | U | Human inattention, lack of knowledge, and failure to cross-checksystem activities could contribute to errors becoming integratedand ingrained in automated systems. | | Modification | |
T-9 | Denial of Service | P | An adversary uses techniques to attack a single target renderingit unable to respond and could cause denial of service for users ofthe targeted information systems. | | | Denial of Service |
T-10 | Distributed Denial of Service Attack | P | An adversary uses multiple compromised information systems toattack a single target and could cause denial of service for usersof the targeted information systems. | | | Denial of Service |
T-11 | Earthquake | E | Seismic activity can damage the information system or itsfacility. Please refer to the following document for earthquakeprobability mapshttp://pubs.usgs.gov/of/2008/1128/pdf/OF08-1128_v1.1.pdf . | | Destruction | Denial of Service |
T-12 | Electromagnetic Interference | E, P | Disruption of electronic and wire transmissions could be causedby high frequency (HF), very high frequency (VHF), and ultra-highfrequency (UHF) communications devices (jamming) or sun spots. | | | Denial of Service |
T-13 | Espionage | P | The illegal covert act of copying, reproducing, recording,photographing or intercepting to obtain sensitive information . | Disclosure | Modification | |
T-14 | Fire | E, P | Fire can be caused by arson, electrical problems, lightning,chemical agents, or other unrelated proximity fires. | | Destruction | Denial of Service |
T-15 | Floods | E | Water damage caused by flood hazards can be caused by proximityto local flood plains. Flood maps and base flood elevation shouldbe considered. | | Destruction | Denial of Service |
T-16 | Fraud | P | Intentional deception regarding data or information about aninformation system could compromise the confidentiality, integrity,or availability of an information system. | Disclosure | Modification or Destruction | Unavailable Accurate Records |
T-17 | Hardware or Equipment Failure | E | Hardware or equipment may fail due to a variety of reasons. | | | Denial of Service |
T-18 | Hardware Tampering | P | An unauthorized modification to hardware that alters the properfunctioning of equipment in a manner that degrades the securityfunctionality the asset provides. | | Modification | Denial of Service |
T-19 | Hurricane | E | A category 1, 2, 3, 4, or 5 land falling hurricane could impactthe facilities that house the information systems. | | Destruction | Denial of Service |
T-20 | Malicious Software | P | Software that damages a system such a virus, Trojan, orworm. | | Modification or Destruction | Denial of Service |
T-21 | Phishing Attack | P | Adversary attempts to acquire sensitive information such asusernames, passwords, or SSNs, by pretending to be communicationsfrom a legitimate/trustworthy source. Typical attacks occur via email, instant messaging, orcomparable means; commonly directing users to Web sites that appearto be legitimate sites, while actually stealing the enteredinformation. | Disclosure | Modification or Destruction | Denial of Service |
T-22 | Power Interruptions | E | Power interruptions may be due to any number of reasons such aselectrical grid failures, generator failures, uninterruptable powersupply failures (e.g. spike, surge, brownout, or blackout). | | | Denial of Service |
T-23 | Procedural Error | U | An error in procedures could result in unintended consequences.This is also used where there is a lack of defined procedures thatintroduces an element of risk. | Disclosure | Modification or Destruction | Denial of Service |
T-24 | Procedural Violations | P | Violations of standard procedures. | Disclosure | Modification or Destruction | Denial of Service |
T-25 | Resource Exhaustion | U | An errant (buggy) process may create a situation that exhaustscritical resources preventing access to services. | | | Denial of Service |
T-26 | Sabotage | P | Underhand interference with work. | | Modification or Destruction | Denial of Service |
T-27 | Scavenging | P | Searching through disposal containers (e.g. dumpsters) toacquire unauthorized data. | Disclosure | | |
T-28 | Severe Weather | E | Naturally occurring forces of nature could disrupt the operationof an information system by freezing, sleet, hail, heat, lightning,thunderstorms, tornados, or snowfall. | | Destruction | Denial of Service |
T-29 | Social Engineering | P | An attacker manipulates people into performing actions ordivulging confidential information, as well as possible access tocomputer systems or facilities. | Disclosure | | |
T-30 | Software Tampering | P | Unauthorized modification of software (e.g. files, programs,database records) that alters the proper operational functions. | | Modification or Destruction | |
T-31 | Terrorist | P | An individual performing a deliberate violent act could use avariety of agents to damage the information system, its facility,and/or its operations. | | Modification or Destruction | Denial of Service |
T-32 | Theft | P | An adversary could steal elements of the hardware. | | | Denial of Service |
T-33 | Time and State | P | An attacker exploits weaknesses in timing or state of functionsto perform actions that would otherwise be prevented (e.g. raceconditions, manipulation user state). | Disclosure | Modification | Denial of Service |
T-34 | Transportation Accidents | E | Transportation accidents include train derailments, river bargeaccidents, trucking accidents, and airlines accidents. Localtransportation accidents typically occur when airports, sea ports,railroad tracks, and major trucking routes occur in close proximityto systems facilities. Likelihood of HAZMAT cargo should bedetermined when considering the probability of local transportationaccidents. | | Destruction | Denial of Service |
T-35 | Unauthorized Facility Access | P | An unauthorized individual accesses a facility which may resultin comprises of confidentiality, integrity, or availability. | Disclosure | Modification or Destruction | Denial of Service |
T-36 | Unauthorized Systems Access | P | An unauthorized user accesses a system or data. | Disclosure | Modification or Destruction | |