Analyzing threat agents and their attributes

Stilianos Vidalis, Andrew Jones

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Modern risk assessment techniques recognize that there is a need to perform a threat assessment in order to identify the threats that a system is facing, and the agents that are able to manifest them. Most of them though do not incorporate the process of identifying and analyzing threat agents. Gathering IDS data and analyzing them is a challenge on its own, but identifying threat agents, and analyzing their attributes is a different game altogether. Is an agent motivated enough to pursue his/her target? Does the agent have the technical capability and the knowledge required to exploit a vulnerability Our intention is not to put labels in certain categories of people, rather to try and understand these and stimulate the discussion between all those of good faith.

Original languageEnglish
Title of host publication4th European Conference on Information Warfare and Security 2005, ECIW 2005
Place of PublicationUK
PublisherAcademic Conferences International (ACI)
Pages369-379
Number of pages11
ISBN (Print)9781905305032
Publication statusPublished - 11 Jul 2005
Event4th European Conference on Information Warfare and Security 2005, ECIW 2005 - Glamorgan, United Kingdom
Duration: 11 Jul 200512 Jul 2005

Conference

Conference4th European Conference on Information Warfare and Security 2005, ECIW 2005
Country/TerritoryUnited Kingdom
CityGlamorgan
Period11/07/0512/07/05

Keywords

  • Threat agent
  • Threat agent categorization
  • Threat agent identification and analysis
  • Threat agent metrics

Fingerprint

Dive into the research topics of 'Analyzing threat agents and their attributes'. Together they form a unique fingerprint.

Cite this