Category talk:Threat Agent

From OWASP
Revision as of 03:58, 27 May 2009 by Deleted user (Talk | contribs)

Jump to: navigation, search

auto california charitable donation links [http://s1.shard.jp/losaul/yamaha-outboard.html countryroad australia ] [http://s1.shard.jp/frhorton/78vbl98c2.html african american migrations from south to north ] africa symbol [http://s1.shard.jp/galeach/new14.html asia asian cream cute girl pure ] [http://s1.shard.jp/galeach/new70.html asia cheap hotel singapore ] [http://s1.shard.jp/bireba/disable-norton.html dr solomons antivirus toolkit ] [http://s1.shard.jp/galeach/new179.html koigokoro fantasia ] [http://s1.shard.jp/losaul/planes-for-sale.html uk australia travel visa ] [http://s1.shard.jp/frhorton/qtog167rl.html west african kingdoms ghana ] [http://s1.shard.jp/frhorton/u4h18i4kg.html africas capitals and countries ] [http://s1.shard.jp/losaul/australia-bank-fee.html education gazette australia ] [http://s1.shard.jp/frhorton/98rznyn69.html global stewardship foundation africa ] asian twinks video [http://s1.shard.jp/bireba/alerta-antiviruses.html norton antivirus 2005 cracked ] [http://s1.shard.jp/galeach/new80.html asian import model picture ] sitemap site [http://s1.shard.jp/olharder/buy-and-sell-autos.html automatic back scratcher ] [http://s1.shard.jp/losaul/quoin-int-australia.html australia veterans affairs ] [http://s1.shard.jp/olharder/automobile-chart.html accident auto chipley florida lawyer ] [http://s1.shard.jp/galeach/new46.html asian lion habitat ] [http://s1.shard.jp/losaul/lawn-bowls-clubs.html aussiewideholidays.com australia australian hotel ] [http://s1.shard.jp/olharder/automation-expense.html david wilson automotive group ] [http://s1.shard.jp/bireba/avg-antivirus-linux.html antivirus for worms ] [http://s1.shard.jp/bireba/norton-antivirus.html computer associates antivirus download ] [http://s1.shard.jp/bireba/guard-antivirus.html escan antivirus software ] automotive suspension types index [http://s1.shard.jp/olharder/celebrity-autograph.html dodge auto parts ] url [http://s1.shard.jp/olharder/automatic-dc-queue.html mitsubishi autos ] [http://s1.shard.jp/losaul/sai-global-australia.html migrated to australia ] auto automobile body car paint tattoo [http://s1.shard.jp/frhorton/1jtffm4w8.html islam spread africa ] [http://s1.shard.jp/bireba/ez-antivirus.html avg free antivirus download ] [http://s1.shard.jp/galeach/new27.html asianow ] [http://s1.shard.jp/losaul/australia-telescope.html australia goverment immigration ] [http://s1.shard.jp/losaul/australian-topographic.html australia festival in market victoria ] [http://s1.shard.jp/frhorton/atm6jbmgn.html africana conceito da familia ] [http://s1.shard.jp/losaul/vetco-aibel.html australian open tennis results mens final ] [http://s1.shard.jp/bireba/antivirus-stop.html how to uninstall norton antivirus 2003 ] [http://s1.shard.jp/galeach/new182.html asian moon festival 2005 ] [http://s1.shard.jp/bireba/winantivirus-pro.html manually uninstall symantec antivirus corporate edition ] [http://s1.shard.jp/bireba/avg-antivirus-software.html avg+antivirus+software ] antivirus software server [http://s1.shard.jp/losaul/desktop-magazine.html rental accommodation melbourne australia ] I can appreciate the attempt made to clarify threats with respect to risk, but a redirection on the wiki from threat to threat agent does not, in my opinion, clarify the most basic concept of threat. The definition of 'threat agent' is distinct from the definition of 'threat'. Agent implies a causative entity and, in the case of the wiki entry, I think has been roughly sketched. What has not been done yet is to define the types of events (the threat) the causative entity (threat agent) brings about. Perhaps a rough workflow of a standard security event (a system compromise) will serve to identify the necessary components that need definition. This may also provide the context needed to keep the definitions from shifting. Here is my previous comment on threat: Category_talk:Threat

Thanks for the comments. You're absolutely right. The intent was not to indicate that 'threat' and 'threat agent' are the same thing. We simply moved the page and it left a redirect behind automatically. I like the idea of creating a model for the 'workflow' or attack-flow or risk-flow or whatever. Can you help us put an article together?