Novell SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010 Reference Manual page 71

Hide thumbs Also See for SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010:
Table of Contents

Advertisement

Column Name
ATTACK_TYPE_CRYPT
ATTACK_TYPE_DOS
ATTACK_TYPE_HIJACK
ATTACK_TYPE_INFO_DISCLOSE
ATTACK_TYPE_INFRASTRUCT
ATTACK_TYPE_INPUT_MANIP
ATTACK_TYPE_MISS_CONFIG
ATTACK_TYPE_RACE
ATTACK_TYPE_OTHER
ATTACK_TYPE_UNKNOWN
IMPACT_CONFIDENTIAL
IMPACT_INTEGRITY
Datatype
Comment
number (1, 0)
This value is
cryptographic. For example, weak
encryption (implementation or algorithm),
no encryption (plaintext), and sniffing.
number (1, 0)
This value is
of service. For example, saturation flood,
crash, lock up, and forced reboot.
number (1, 0)
This value is
For example, man-in-the-middle attacks,
IP spoofing, session timeout or take-over,
and session replay.
number (1, 0)
This value is
information disclosure. For example,
comments, passwords, fingerprinting, and
system information.
number (1, 0)
This value is
infrastructure. For example, DNS
poisoning and route manipulation.
number (1, 0)
This value is
manipulation. For example, XSS, SQL
injection, file retrieval, directory traversal,
overflows, and URL encoding.
number (1, 0)
This value is
misconfiguration. For example, default
files, debugging enabled, and directory
indexing.
number (1, 0)
This value is
condition. For example, symlink.
number (1, 0)
This value is
fall under any of the above attack types.
number (1, 0)
This value is
unknown.
number (1, 0)
This value is
attack(s) is loss of confidential
information. For example, passwords,
server information, environment
variables, confirmation of file existence,
path disclosure, file content access, and
SQL injection.
number (1, 0)
This value is
attack(s) is loss of integrity, which results
in data modifications by unauthorized
persons. For example, unauthorized file
modification, deletion, or creation, remote
file inclusion, and arbitrary command
execution.
1
if the attack type is
1
if the attack type is denial
if the attack type is hijack.
1
1
if the attack type is
1
if the attack type is
1
if the attack type is input
1
if the attack type is
if the attack type is race
1
if the attack type does not
1
if the attack type is
1
if the impact of the
1
if the impact of the
1
Sentinel Database Views for Oracle
71

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SENTINEL 6.1 SP2 - REFERENCE GUIDE 02-2010 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Sentinel 6.1 sp2

Table of Contents