This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Threat agent template"
From OWASP
Leocavallari (talk | contribs) (New page: ==Description== This is the structure of a Threat Agent Article. Sections "Overview", "Abstract", "Discussion", "Required Resources" and "Plataform", if existent, should be properly desc...) |
|||
Line 1: | Line 1: | ||
+ | Every '''[[Threat Agent]]''' should follow this template. | ||
+ | |||
==Description== | ==Description== | ||
− | + | A threat agent is a group of "attackers" that carry out an [[attack]]. They can be human (intentional or unintentional) or natural (flood, fire, etc...). | |
+ | # Start with a one-sentence description of the threat agent | ||
+ | # Who are the people that make up this threat agent? | ||
+ | # Discuss characteristics of the threat agent. | ||
− | |||
− | + | ==Risk Factors== | |
− | + | ||
+ | * Talk about the [[OWASP Risk Rating Methodology|factors]] that make this threat agent likely or unlikely to attack | ||
+ | * Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent | ||
==Examples== | ==Examples== | ||
− | + | ; Short example name | |
+ | : One paragraph example description with [http://www.site.com links] | ||
+ | |||
+ | ; Short example name | ||
+ | : One paragraph example description with [http://www.site.com links] | ||
+ | |||
+ | ==Related [[Attacks]]== | ||
− | + | * [[Attack 1]] | |
+ | * [[Attack 2]] | ||
− | == | + | ==Related [[Vulnerabilities]]== |
+ | * [[Vulnerability 1]] | ||
+ | * [[Vulnerabiltiy 2]] | ||
− | + | Note: the contents of "Related Problems" sections should be placed here | |
− | ==Related | + | ==Related [[Countermeasures]]== |
+ | * [[Countermeasure 1]] | ||
+ | * [[Countermeasure 2]] | ||
− | + | Note: contents of "Avoidance and Mitigation" Sections should be placed here | |
− | |||
− | ==Related | + | ==Related [[Technical Impacts]]== |
− | + | ||
+ | * [[Technical Impact 1]] | ||
+ | * [[Technical Impact 2]] | ||
==References== | ==References== | ||
+ | |||
+ | * http://www.link1.com | ||
+ | * [http://www.link2.com Title for the link] | ||
− | <nowiki>[[Category: | + | When the article is reviewed, the "Honeycomb" category can be removed and replaced with the "ASDR" category |
+ | <nowiki>[[Category:OWASP Honeycomb Project]]</nowiki> | ||
+ | <nowiki>[[Category:OWASP ASDR Project]]</nowiki> | ||
− | + | __NOTOC__ |
Revision as of 04:25, 13 February 2008
Every Threat Agent should follow this template.
Description
A threat agent is a group of "attackers" that carry out an attack. They can be human (intentional or unintentional) or natural (flood, fire, etc...).
- Start with a one-sentence description of the threat agent
- Who are the people that make up this threat agent?
- Discuss characteristics of the threat agent.
Risk Factors
- Talk about the factors that make this threat agent likely or unlikely to attack
- Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent
Examples
- Short example name
- One paragraph example description with links
- Short example name
- One paragraph example description with links
Related Attacks
Related Vulnerabilities
Note: the contents of "Related Problems" sections should be placed here
Related Countermeasures
Note: contents of "Avoidance and Mitigation" Sections should be placed here
Related Technical Impacts
References
When the article is reviewed, the "Honeycomb" category can be removed and replaced with the "ASDR" category
[[Category:OWASP Honeycomb Project]]
[[Category:OWASP ASDR Project]]