This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Threat agent template"
From OWASP
Leocavallari (talk | contribs) |
Leocavallari (talk | contribs) |
||
Line 42: | Line 42: | ||
* http://www.link1.com | * http://www.link1.com | ||
* [http://www.link2.com Title for the link2] | * [http://www.link2.com Title for the link2] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
__NOTOC__ | __NOTOC__ | ||
[[Media:Example.ogg]] | [[Media:Example.ogg]] |
Revision as of 15:15, 2 May 2008
Every Threat Agent should follow this template.
This is a threat agent. To view all threat agents, please go to Threat Agent Category page.
Last revision (mm/dd/yy): 05/2/2008
Description
A threat agent is a group of "attackers" that carry out an attack. They can be human (intentional or unintentional) or natural (flood, fire, etc...).
- Start with a one-sentence description of the threat agent
- Who are the people that make up this threat agent?
- Discuss characteristics of the threat agent.
Risk Factors
- Talk about the factors that make this threat agent likely or unlikely to attack
- Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Note: the contents of "Related Problems" sections should be placed here