Difference between revisions of "Logic/time bomb"

From OWASP
Jump to: navigation, search
(One intermediate revision by one user not shown)
Line 5: Line 5:
 
<br>
 
<br>
 
[[Category:OWASP ASDR Project]]
 
[[Category:OWASP ASDR Project]]
[[ASDR Table of Contents]]__TOC__
 
  
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
Line 49: Line 48:
  
  
[[Category:Malicious Code Attack]]
+
[[Category:Embedded Malicious Code]]

Revision as of 16:58, 7 April 2009

This is a threat agent. To view all threat agents, please go to Threat Agent Category page.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.



Last revision (mm/dd/yy): 04/7/2009

Description

A threat agent is a group of "attackers" that carry out an attack. They can be human (intentional or unintentional) or natural (flood, fire, etc...).

  1. Start with a one-sentence description of the threat agent
  2. Who are the people that make up this threat agent?
  3. Discuss characteristics of the threat agent.


Risk Factors

  • Talk about the factors that make this threat agent likely or unlikely to attack
  • Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent

Examples

Short example name

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links

Related Attacks

Related Vulnerabilities

References