Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

1 Introduction
1.1 Background
1.1.1 Description
1.1.2 Historical Information
1.1.3 Significance
1.1.4 Literature Review
1.2 Purpose
1.2.1 Reason for Investigation
1.2.2 Roadmap Challenges
1.2.3 Audience
1.2.4 Desired Response
1.3 Scope
1.3.1 Extent and Limits of Investigation
1.3.2 Goals
1.3.3 Objectives
2 Approach
2.1 Methods
2.2 Assumptions
2.3 Procedures
3 Results and Discussion
3.1 Threat Attributes
3.1.1 Commitment Attribute Family
3.1.1.1 Intensity
3.1.1.2 Stealth
3.1.1.3 Time
3.1.2 Resource Attribute Family
3.1.2.1 Technical Personnel
3.1.2.2 Knowledge
3.1.2.3 Access
3.2 Generic Threat Profiles
Table 3.1 Generic Threat Matrix
3.2.1 Observations
3.2.2 Multipliers
3.2.2.1 Funding
3.2.2.2 Assets
3.2.2.3 Technology
3.3 Validation of the Generic Threat Matrix
3.3.1 Attack Tree Analysis
3.3.2 Case Studies
3.3.2.1 High-level Threat
Table 3.2 High-level Threat Profiles
3.3.2.2 Mid-level Threat
3.3.2.3 Low-level Threat
4 Conclusions
5 Recommendations
Appendix A: Bibliography
Appendix B: Acronyms
Appendix C: Glossary
Appendix D: For More Information
0 of .
Results for:
No results containing your search query
P. 1
SAND2007-5791.pdf

SAND2007-5791.pdf

Ratings: (0)|Views: 1|Likes:
Published by Nancy Martin
Offensive Security FSU Intro and Overview
Offensive Security FSU Intro and Overview

More info:

Published by: Nancy Martin on Oct 27, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/27/2013

pdf

text

original

You're Reading a Free Preview
Pages 5 to 44 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->