Show simple item record

dc.contributor.authorStringhini, Gianlucaen_US
dc.date.accessioned2020-04-23T15:06:51Z
dc.date.available2020-04-23T15:06:51Z
dc.date.issued2019-10-01
dc.identifier.citationGianluca Stringhini. 2019. "Adversarial Behaviours Knowledge Area."
dc.identifier.urihttps://hdl.handle.net/2144/40309
dc.description.abstractThe technological advancements witnessed by our society in recent decades have brought improvements in our quality of life, but they have also created a number of opportunities for attackers to cause harm. Before the Internet revolution, most crime and malicious activity generally required a victim and a perpetrator to come into physical contact, and this limited the reach that malicious parties had. Technology has removed the need for physical contact to perform many types of crime, and now attackers can reach victims anywhere in the world, as long as they are connected to the Internet. This has revolutionised the characteristics of crime and warfare, allowing operations that would not have been possible before. In this document, we provide an overview of the malicious operations that are happening on the Internet today. We first provide a taxonomy of malicious activities based on the attacker’s motivations and capabilities, and then move on to the technological and human elements that adversaries require to run a successful operation. We then discuss a number of frameworks that have been proposed to model malicious operations. Since adversarial behaviours are not a purely technical topic, we draw from research in a number of fields (computer science, criminology, war studies). While doing this, we discuss how these frameworks can be used by researchers and practitioners to develop effective mitigations against malicious online operations.en_US
dc.language.isoen_US
dc.relation.ispartofCyber Security Body of Knowledge
dc.rightsCyBOK © Crown Copyright, The National Cyber Security Centre 2018, licensed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open-government-licence/.en_US
dc.rights.urihttp://www.nationalarchives.gov.uk/doc/open-government-licence/
dc.titleAdversarial behaviours knowledge areaen_US
dc.typeBook chapteren_US
dc.description.versionPublished versionen_US
pubs.elements-sourcemanual-entryen_US
pubs.notesEmbargo: Not knownen_US
pubs.organisational-groupBoston Universityen_US
pubs.organisational-groupBoston University, College of Engineeringen_US
pubs.organisational-groupBoston University, College of Engineering, Department of Electrical & Computer Engineeringen_US
pubs.publication-statusPublisheden_US
dc.identifier.mycv516364


This item appears in the following Collection(s)

Show simple item record