Profiling malicious actor motives using offender profiling techniques | Framework

Profiling malicious actor motives using offender profiling techniques | Framework

Version v0.8
Download 8
Total Views 52
Stock
File Size 1.11 MB
File Type pdf
Create Date 29th June 2017
Last Updated 29th June 2017
Rights Reserved

You agree that with downloading this report that you will use its contents respectfully and only use its contents if the author has been appropriately referenced.

There are a myriad of ways in which offender profiling can be performed. This can vary from using industry recognised tools like the Cyber Kill ChainĀ® and Diamond model to using in house tools. As well as this however there are a handful of frameworks out there for this very purpose.

Over the past year I have created one such framework. This framework is broken into 7 modules that can be used one at at time or all together. The purpose of this framework is to create a bigger picture of an attack. It does this by allowing for the cross referencing of attacks.

James Stevenson

Im a Cyber Security enthusiast that loves all things to do with technology. I'm specifically interested in cyber security and ethical hacking.