URI: P.A.HP.0
Package: Network
< prev | next >
Description: Loss of availability at Host affects Process: if device Host becomes unavailable, so will the process Process hosted there.
Threat Type: Secondary Threat
Matching Pattern:
Finds a Process and its Host, and optionally the host manager and the interactive user of the process.
SLA constrained virtual host Host becomes unavailable: if clusterable virtual host Host running in data centre DataCentre becomes overloaded, and it is limited by an SLA from scaling up its use of resources at DataCentre, then it may become unavailable.
Loss of availability at DataCentre affects Host: if data centre DataCentre becomes unavailable, so will the host Host provisioned at DataCentre.
Loss of availability at overloaded host Host: if Host is overloaded, then it will be unable to fulfil its function and become effectively unavailable.
Use of privilege to control Host availability: anyone who controls resource allocation for Host can control the availability of Host instances.
Software bug crashes Host: a software bug in the operating system of device Host causes it to crash, compromising availability.
Loss of availability through disabled device Host: device Host is vulnerable, and the security control strategy was to disable Host, causing a loss of availability.
Use of privilege to control Host availability: an attacker who has gained admin rights for a device Host can crash or deny access to it. For mobile hosts, we assume the host can be permanently locked down, so access in any context is sufficient, causing loss of availablity unless independent instances of class Host are available.
Loss of availability through disabling vulnerable device Host: if device Host is vulnerable to attack, and the security control strategy is for its manager HostManager to disable Host to prevent the attack, this will cause a loss of availability.
Loss of availability through disabling infected device Host: if device Host is vulnerable to malware infection, and the security control strategy is for its manager HostManager to disable Host if it becomes infected, this will cause a loss of availability.
Destruction of Host in Space: an attacker with access to Space can physically remove or destroy device Host, removing it from the system and making it unavailable.
Loss of availability at SHost affects Host: if host SHost becomes unavailable, so will the host Host provisioned on SHost.
Restriction on availability of virtual host Host provisioned by SHost: whoever controls resource allocation for devices of class SHost can control availability for virtual hosts of class Host provisioned on SHost.
Attacker exploit disables Host: the attacker exploits a vulnerability in device Host and is able to crash the device.
Unavailable process Process cannot create stored copy of Data on Host: if process Process is not available, then it cannot create a local stored copy of Data on Host, so that copy will not be available.
Unavailable process Process cannot update stored copy of Data: if process Process is not available, then it cannot update a local stored copy of Data on Host, which will become out of date.
        (empty)