Threat Agent Profile

Threat Agent Profile

A description of an organized crime (with insiders) group operating against the hypothetical Acme company. Utility functions are used to describe the capabilities of this adversary and what goals they are trying to achieve. This input will be used to estimate the probability the adversary will perform the various attack scenarios in an attack tree.

Threat Agent Profile

 

Click to see other screenshots:

Acme Attack Tree
Acme Attack Scenarios
Pruned Attack Tree
Threat Agent Profile
Threat Agent Utility Function
Risk by Configuration and Threat
High Risk Scenarios
Hostile Risk Scatter Graph
Linux Attack Tree
Privileged Process Attack Tree

 


Home Close Window

Copyright © 2024 Amenaza Technologies Limited. All rights reserved.