This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Threat agent template"

From OWASP
Jump to: navigation, search
 
(7 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
Every '''[[Threat Agent]]''' should follow this template.
 
Every '''[[Threat Agent]]''' should follow this template.
 +
 +
{{Template:Threat}}
 +
 +
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
  
 
==Description==
 
==Description==
Line 13: Line 17:
 
* Talk about the [[OWASP Risk Rating Methodology|factors]] that make this threat agent likely or unlikely to attack
 
* Talk about the [[OWASP Risk Rating Methodology|factors]] that make this threat agent likely or unlikely to attack
 
* Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent
 
* Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent
 
  
 
==Examples==
 
==Examples==
  
; Short example name
+
===Short example name===
: One paragraph example description with [http://www.site.com links]
+
: A short example description, small picture, or sample code with [http://www.site.com links]
 
 
; Short example name
 
: One paragraph example description with [http://www.site.com links]
 
  
 +
===Short example name===
 +
: A short example description, small picture, or sample code with [http://www.site.com links]
  
 
==Related [[Attacks]]==
 
==Related [[Attacks]]==
Line 28: Line 30:
 
* [[Attack 1]]
 
* [[Attack 1]]
 
* [[Attack 2]]
 
* [[Attack 2]]
 
  
 
==Related [[Vulnerabilities]]==
 
==Related [[Vulnerabilities]]==
Line 36: Line 37:
  
 
Note: the contents of "Related Problems" sections should be placed here
 
Note: the contents of "Related Problems" sections should be placed here
 
 
==Related [[Countermeasures]]==
 
 
* [[Countermeasure 1]]
 
* [[Countermeasure 2]]
 
 
Note: contents of "Avoidance and Mitigation" Sections should be placed here
 
 
 
==Related [[Technical Impacts]]==
 
 
* [[Technical Impact 1]]
 
* [[Technical Impact 2]]
 
 
  
 
==References==
 
==References==
  
 
* http://www.link1.com
 
* http://www.link1.com
* [http://www.link2.com Title for the link]
+
* [http://www.link2.com Title for the link2]
 
 
 
 
When the article is reviewed, the "Honeycomb" category can be removed and replaced with the "ASDR" category
 
<nowiki>[[Category:OWASP Honeycomb Project]]</nowiki>
 
<nowiki>[[Category:OWASP ASDR Project]]</nowiki>
 
  
 
__NOTOC__
 
__NOTOC__

Latest revision as of 19:12, 20 June 2008

Every Threat Agent should follow this template.


This is a threat agent. To view all threat agents, please go to Threat Agent Category page.

Last revision (mm/dd/yy): 06/20/2008

Description

A threat agent is a group of "attackers" that carry out an attack. They can be human (intentional or unintentional) or natural (flood, fire, etc...).

  1. Start with a one-sentence description of the threat agent
  2. Who are the people that make up this threat agent?
  3. Discuss characteristics of the threat agent.


Risk Factors

  • Talk about the factors that make this threat agent likely or unlikely to attack
  • Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent

Examples

Short example name

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links

Related Attacks

Related Vulnerabilities

Note: the contents of "Related Problems" sections should be placed here

References