Your SlideShare is downloading. ×
Cyber Threat Taxonomy Matrix APR 2014
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Cyber Threat Taxonomy Matrix APR 2014

161
views

Published on

Cyber Threat Taxonomy Matrix APR 2014

Cyber Threat Taxonomy Matrix APR 2014

Published in: Internet

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
161
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Red-DragonRising.com© Cyber Threat Taxonomy Red-DragonRising.com© Cyber Threat Motive Targets of Opportunity Methodologies Capabilities Nation States ~ Peace Time Economic, Military, Political Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure Military & Intel specific cyber doctrine, hacktivists Asymmetric use of the cyber domain short of kinetic Nation States ~ War Time Economic, Military, Political Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure Military & Intel specific cyber doctrine, hacktivists Asymmetric use of the cyber domain including kinetic Cyber Terrorists & Insurgents Political Infrastructure, Extortion and Political Processes Combination of advanced persistent threats (APT) Developing – will be a concern in 2012 Cyber Criminals – Grey & Black Markets Financial Intellectual Property Theft, Fraud, Theft, Scams, Hijacked Network & Computer Resources, Cyber Crime for Hire Exploits, Malware Botnets, Worms & Trojans Cell-based structure as an APT Criminal Organizations – RBS Financial Use of above with distinct planning Highly professional, dangerous Rogue Organizations – Anonymous, LulzSec Financial Intellectual Property Theft, Direct & Indirect pressure on OGA Resources Organic hacking capabilities unsurpassed Organized yet de- centralized