Difference between revisions of "Threat agent template"

From OWASP
Jump to: navigation, search
(New page: ==Description== This is the structure of a Threat Agent Article. Sections "Overview", "Abstract", "Discussion", "Required Resources" and "Plataform", if existent, should be properly desc...)
 
 
(8 intermediate revisions by 2 users not shown)
Line 1: Line 1:
==Description==
+
Every '''[[Threat Agent]]''' should follow this template.
  
This is the structure of a Threat Agent Article.
+
{{Template:Threat}}
  
Sections "Overview", "Abstract", "Discussion", "Required Resources" and "Plataform", if existent, should be properly describe here, without subsections.
+
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
  
In case of a "Exposure Period" section exists, it should be placed here as a subsection.
+
==Description==
Ex:<nowiki>===Exposure Period===</nowiki>
+
  
 +
A threat agent is a group of "attackers" that carry out an [[attack]]. They can be human (intentional or unintentional) or natural (flood, fire, etc...).
 +
# Start with a one-sentence description of the threat agent
 +
# Who are the people that make up this threat agent?
 +
# Discuss characteristics of the threat agent.
  
==Examples==
 
  
===Example 1===
+
==Risk Factors==
  
 +
* Talk about the [[OWASP Risk Rating Methodology|factors]] that make this threat agent likely or unlikely to attack
 +
* Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent
  
===Example n===
+
==Examples==
  
 +
===Short example name===
 +
: A short example description, small picture, or sample code with [http://www.site.com links]
  
==Likelihood of exploitation==
+
===Short example name===
 +
: A short example description, small picture, or sample code with [http://www.site.com links]
  
 +
==Related [[Attacks]]==
  
==Related Threats Agents==
+
* [[Attack 1]]
 +
* [[Attack 2]]
  
 +
==Related [[Vulnerabilities]]==
  
==Related Attacks==
+
* [[Vulnerability 1]]
 
+
* [[Vulnerabiltiy 2]]
 
+
==Related Vulnerabilities==
+
PS: contents of "Related Problems" sections should be placed here
+
 
+
 
+
==Related Countermeasures==
+
PS: contents of "Avoidance and Mitigation" Sections should be placed here
+
  
 +
Note: the contents of "Related Problems" sections should be placed here
  
 
==References==
 
==References==
  
 +
* http://www.link1.com
 +
* [http://www.link2.com Title for the link2]
  
<nowiki>[[Category:XYZ]]</nowiki>
+
__NOTOC__
 
+
<nowiki>[[Category:XPTO]]</nowiki>
+

Latest revision as of 14:12, 20 June 2008

Every Threat Agent should follow this template.


This is a threat agent. To view all threat agents, please go to Threat Agent Category page.

Last revision (mm/dd/yy): 06/20/2008

Description

A threat agent is a group of "attackers" that carry out an attack. They can be human (intentional or unintentional) or natural (flood, fire, etc...).

  1. Start with a one-sentence description of the threat agent
  2. Who are the people that make up this threat agent?
  3. Discuss characteristics of the threat agent.


Risk Factors

  • Talk about the factors that make this threat agent likely or unlikely to attack
  • Be sure to discuss the size, motivation, capabilities, and opportunity of this threat agent

Examples

Short example name

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links

Related Attacks

Related Vulnerabilities

Note: the contents of "Related Problems" sections should be placed here

References