Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1 Introduction
1.1 Background
1.1.1 Description
1.1.2 Historical Information
1.1.3 Significance
1.1.4 Literature Review
1.2 Purpose
1.2.1 Reason for Investigation
1.2.2 Roadmap Challenges
1.2.3 Audience
1.2.4 Desired Response
1.3 Scope
1.3.1 Extent and Limits of Investigation
1.3.2 Goals
1.3.3 Objectives
2 Approach
2.1 Methods
2.2 Assumptions
2.3 Procedures
3 Results and Discussion
3.1 Threat Attributes
3.1.1 Commitment Attribute Family Intensity Stealth Time
3.1.2 Resource Attribute Family Technical Personnel Knowledge Access
3.2 Generic Threat Profiles
Table 3.1 Generic Threat Matrix
3.2.1 Observations
3.2.2 Multipliers Funding Assets Technology
3.3 Validation of the Generic Threat Matrix
3.3.1 Attack Tree Analysis
3.3.2 Case Studies High-level Threat
Table 3.2 High-level Threat Profiles Mid-level Threat Low-level Threat
4 Conclusions
5 Recommendations
Appendix A: Bibliography
Appendix B: Acronyms
Appendix C: Glossary
Appendix D: For More Information
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 1|Likes:
Published by Nancy Martin
Offensive Security FSU Intro and Overview
Offensive Security FSU Intro and Overview

More info:

Published by: Nancy Martin on Oct 27, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 44 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->