Check json format

pull/115/head
Juan Rocha 2018-09-12 09:16:37 +02:00
parent b2227681cd
commit aa550dced7
1 changed files with 157 additions and 157 deletions

View File

@ -1,7 +1,7 @@
{
"namespace": "monarc",
"expanded": "MONARC Threats",
"version": 1.0,
"version": 1,
"description": "MONARC Threats Taxonomy",
"refs": [
"https://monarc.lu"
@ -30,7 +30,7 @@
{
"value": "physical-damage",
"expanded": "Physical damage"
},
}
],
"values": [
{
@ -59,12 +59,12 @@
{
"value": "abuse-of-rights",
"expanded": "Abuse of rights",
"description" : "Someone with special rights (network administration, computer specialists, etc.) modifies the operating characteristics of the resources."
"description": "Someone with special rights (network administration, computer specialists, etc.) modifies the operating characteristics of the resources."
},
{
"value": "breach-of-personnel-availability",
"expanded": "Breach of personnel availability",
"description" : "Absence of qualified or authorised personnel to execute the usual operations."
"description": "Absence of qualified or authorised personnel to execute the usual operations."
}
]
},
@ -87,7 +87,7 @@
"description": "A person carries out information processing that is forbidden by the law or a regulation."
}
]
}
},
{
"predicate": "compromise-of-information",
"entry": [
@ -105,7 +105,7 @@
"value": "interception-of-compromising-interference-signals",
"expanded": "Interception of compromising interference signals",
"description": "Interfering signals from an electromagnetic source emitted by the equipment (by conduction on the electrical power supply cables or earth wires or by radiation in free space). Capture of these signals depends on the distance to the targeted equipment or the possibility of connecting to cables or any other conductor passing close to the equipment (coupling phenomenon)."
}
},
{
"value": "theft-or-destruction-of-media-documents-or-equipment",
"expanded": "Theft or destruction of media, documents or equipment",
@ -120,7 +120,7 @@
"value": "malware-infection",
"expanded": "Malware infection",
"description": "Unwanted software that is doing operations seeking to harm the company."
}
},
{
"value": "data-from-untrustworthy-sources",
"expanded": "Data from untrustworthy sources",
@ -132,7 +132,7 @@
"description": "Person who voluntarily or negligently disclosure information."
}
]
}
},
{
"predicate": "loss-of-essential-services",
"entry": [
@ -152,7 +152,7 @@
"description": "Failure, shutdown or inadequacy of the air-conditioning service may cause assets requiring cooling or ventilation to shut down, malfunction or fail completely."
}
]
}
},
{
"predicate": "technical-failures",
"entry": [
@ -174,10 +174,10 @@
{
"value": "breach-of-information-system-maintainability",
"expanded": "Breach of information system maintainability",
"description": "Lack of expertise in the system making retrofitting and upgrading impossible."
"description": "Lack of expertise in the system making retrofitting and upgrading impossible"
}
]
}
},
{
"predicate": "physical-damage",
"entry": [
@ -194,12 +194,12 @@
{
"value": "water-damage",
"expanded": "Water damage",
"description": "Situation facilitating the water hazard on equipment (floods, water leak, cellars, etc.)."
"description": "Situation facilitating the water hazard on equipment (floods, water leak, cellars, etc.)"
},
{
"value": "major-accident",
"expanded": "Major accident",
"description": "Any event that can physically destroy the premises."
"description": "Any event that can physically destroy the premises"
},
{
"value": "pollution",