Profiling malicious actor motives using offender profiling techniques | Framework
|File Size||1.11 MB|
|Create Date||29th June 2017|
|Last Updated||29th June 2017|
You agree that with downloading this report that you will use its contents respectfully and only use its contents if the author has been appropriately referenced.
There are a myriad of ways in which offender profiling can be performed. This can vary from using industry recognised tools like the Cyber Kill Chain® and Diamond model to using in house tools. As well as this however there are a handful of frameworks out there for this very purpose.
Over the past year I have created one such framework. This framework is broken into 7 modules that can be used one at at time or all together. The purpose of this framework is to create a bigger picture of an attack. It does this by allowing for the cross referencing of attacks.