University of Hertfordshire

By the same authors

Analyzing threat agents and their attributes

Research output: Chapter in Book/Report/Conference proceedingConference contribution

View graph of relations
Original languageEnglish
Title of host publication4th European Conference on Information Warfare and Security 2005, ECIW 2005
Place of PublicationUK
PublisherAcademic Conferences and Publishing International Limited
Pages369-379
Number of pages11
ISBN (Print)9781905305032
Publication statusPublished - 11 Jul 2005
Event4th European Conference on Information Warfare and Security 2005, ECIW 2005 - Glamorgan, United Kingdom
Duration: 11 Jul 200512 Jul 2005

Conference

Conference4th European Conference on Information Warfare and Security 2005, ECIW 2005
CountryUnited Kingdom
CityGlamorgan
Period11/07/0512/07/05

Abstract

Modern risk assessment techniques recognize that there is a need to perform a threat assessment in order to identify the threats that a system is facing, and the agents that are able to manifest them. Most of them though do not incorporate the process of identifying and analyzing threat agents. Gathering IDS data and analyzing them is a challenge on its own, but identifying threat agents, and analyzing their attributes is a different game altogether. Is an agent motivated enough to pursue his/her target? Does the agent have the technical capability and the knowledge required to exploit a vulnerability Our intention is not to put labels in certain categories of people, rather to try and understand these and stimulate the discussion between all those of good faith.

ID: 10606556