OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti] Attack Motivations


.02:  Like Sophistication, we should directly adopt  an existing, well vetted, Taxonomy.  

@Patrick/ISightPartners or @EclecticIQ:  Can you provide reference?

Patrick Maroney
President
Integrated Networking Technologies, Inc.
Desk: (856)983-0001
Cell: (609)841-5104
Email: pmaroney@specere.org




On Sun, Aug 7, 2016 at 12:15 AM -0400, "Jordan, Bret" <bret.jordan@bluecoat.com> wrote:

All,

Intrusion Sets and Threat Actors both use the Attack Motivations vocabulary.  Right now we have the following terms in that vocab:

  1. accidental
  2. coercion
  3. dominance
  4. ideology
  5. notoriety
  6. organizational-gain
  7. personal-gain
  8. personal-satisfaction
  9. revenge
  10. unpredictable


I propose that we add the following thee terms to this list, I missed them when I was putting this list together.  

  1. amusement
  2. advantage (competitive, political, economic)
  3. anarchy





Thanks,

Bret



Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO
Blue Coat Systems
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]