Abstract
Modern risk assessment techniques recognize that there is a need to perform a threat assessment in order to identify the threats that a system is facing, and the agents that are able to manifest them. Most of them though do not incorporate the process of identifying and analyzing threat agents. Gathering IDS data and analyzing them is a challenge on its own, but identifying threat agents, and analyzing their attributes is a different game altogether. Is an agent motivated enough to pursue his/her target? Does the agent have the technical capability and the knowledge required to exploit a vulnerability Our intention is not to put labels in certain categories of people, rather to try and understand these and stimulate the discussion between all those of good faith.
Original language | English |
---|---|
Title of host publication | 4th European Conference on Information Warfare and Security 2005, ECIW 2005 |
Place of Publication | UK |
Publisher | Academic Conferences International (ACI) |
Pages | 369-379 |
Number of pages | 11 |
ISBN (Print) | 9781905305032 |
Publication status | Published - 11 Jul 2005 |
Event | 4th European Conference on Information Warfare and Security 2005, ECIW 2005 - Glamorgan, United Kingdom Duration: 11 Jul 2005 → 12 Jul 2005 |
Conference
Conference | 4th European Conference on Information Warfare and Security 2005, ECIW 2005 |
---|---|
Country/Territory | United Kingdom |
City | Glamorgan |
Period | 11/07/05 → 12/07/05 |
Keywords
- Threat agent
- Threat agent categorization
- Threat agent identification and analysis
- Threat agent metrics