This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Logic/time bomb"
From OWASP
| Line 1: | Line 1: | ||
| + | |||
| + | {{Template:Threat}} | ||
| + | |||
| + | <br> | ||
| + | [[Category:OWASP ASDR Project]] | ||
| + | [[ASDR Table of Contents]]__TOC__ | ||
| + | |||
| + | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
==Description== | ==Description== | ||
| − | ==Examples == | + | A threat agent is a group of "attackers" that carry out an [[attack]]. They can be human (intentional or unintentional) or natural (flood, fire, etc...). |
| + | # Start with a one-sentence description of the threat agent | ||
| + | # Who are the people that make up this threat agent? | ||
| + | # Discuss characteristics of the threat agent. | ||
| + | |||
| + | |||
| + | ==Risk Factors== | ||
| + | |||
| + | * Talk about the [[OWASP Risk Rating Methodology|factors]] that make this threat agent likely or unlikely to attack | ||
| + | * Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent | ||
| + | |||
| + | ==Examples== | ||
| + | |||
| + | ===Short example name=== | ||
| + | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
| + | |||
| + | ===Short example name=== | ||
| + | : A short example description, small picture, or sample code with [http://www.site.com links] | ||
| + | |||
| + | ==Related [[Attacks]]== | ||
| + | |||
| + | * [[Attack 1]] | ||
| + | * [[Attack 2]] | ||
| + | |||
| + | ==Related [[Vulnerabilities]]== | ||
| + | |||
| + | * [[Vulnerability 1]] | ||
| + | * [[Vulnerabiltiy 2]] | ||
| − | + | Note: the contents of "Related Problems" sections should be placed here | |
| − | == | + | ==References== |
| − | + | * http://www.link1.com | |
| + | * [http://www.link2.com Title for the link2] | ||
| − | + | __NOTOC__ | |
| − | |||
{{Template:Stub}} | {{Template:Stub}} | ||
[[Category:Malicious Code Attack]] | [[Category:Malicious Code Attack]] | ||
Revision as of 13:42, 7 September 2008
This is a threat agent. To view all threat agents, please go to Threat Agent Category page.
ASDR Table of Contents
Last revision (mm/dd/yy): 09/7/2008
Description
A threat agent is a group of "attackers" that carry out an attack. They can be human (intentional or unintentional) or natural (flood, fire, etc...).
- Start with a one-sentence description of the threat agent
- Who are the people that make up this threat agent?
- Discuss characteristics of the threat agent.
Risk Factors
- Talk about the factors that make this threat agent likely or unlikely to attack
- Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Note: the contents of "Related Problems" sections should be placed here
References
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.