• Login
    View Item 
    •   Home
    • WODC Repository
    • WODC Publications
    • View Item
    •   Home
    • WODC Repository
    • WODC Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of WODC RepositoryCommunitiesPublication DateAuthorsTitlesKeywordsProjectSeriesThis CollectionPublication DateAuthorsTitlesKeywordsProjectSeries

    My Account

    LoginRegister

    WODC links

    Website WODCWebsite WODC (English)Zoekhulp/Search Help

    Statistics

    Display statistics

    Towards a new cyber threat actor typology

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    2740_Volledige_Tekst_tcm28-273 ...
    Size:
    2.712Mb
    Format:
    PDF
    Download
    Thumbnail
    Name:
    2740_Summary_tcm28-273244.pdf
    Size:
    160.1Kb
    Format:
    PDF
    Download
    Thumbnail
    Name:
    2740_Samenvatting_tcm28-273245.pdf
    Size:
    164.3Kb
    Format:
    PDF
    Download
    Auteur / Author
    Bruijne, M. de
    Eeten, M. van
    Gañán, C.H.
    Pieters, W.
    Organisatie / Institution
    Delft University of Technology - Faculty of Technology, Policy and Management
    WODC
    Serie / Series
    WODC Rapport 2740
    Trefwoorden / Keywords
    Hacking
    Darknet
    Delinquenten
    Daderkenmerk
    Cybersecurity
    Computerfraude
    Modus operandi
    Risicogevoeligheid
    Informatie- en communicatietechnologie
    Classificatie
    Informatievoorziening
    Computercriminaliteit
    Internet
    Show allShow less
    Project
    2740
    URI
    http://hdl.handle.net/20.500.12832/2299
    
    Metadata
    Show full item record
    Titel / Title
    Towards a new cyber threat actor typology
    Ondertitel / Subtitle
    a hybrid method for the NCSC cyber security assessment
    Samenvatting
    For some years a cyber threat actor typology is used in the annual Cyber Security Assessment Netherlands. It has evolved over time and captures a set of actors with different motives, intentions and capabilities. In view of its age and rather intuitive development process, it is considered whether the current typology needs to be updated and improved in light of recent insights from science and cyber security practice. This report sets out to develop a new and systematic method to enable the National Cyber Security Centre (NCSC) of the National Coordinator for Security and Counterterrorism (NCTV) to continuously update its cyber actor typology. Section 3.5 contains a concise description of the framework, to be used as a standalone document. As part of the method description, a tentative new typology is developed. This can be found in Section 5.3. The research questions which accompany the project goals were: To what extent is the current cyber actor typology validated by recent insights fromscience and cyber security practice and what design criteria for a new cyber actortypology can be identified? What method to develop a cyber actor typology satisfies the identified design criteriaand enhances or enriches the current cyber actor typology different cyber actors? To what extent can a typology be constructed based upon state-of-the art knowledgeon cyber actors and empirical data on cyber incidents, and what would the resultingtypology look like?

    CONTENT: 1. Introduction 2. Designing a method for a cyber threat actor typology 3. The deductive approach - threat actor typology framework 4. The inductive approach - data analysis 5. A tentative new threat actor typology
    Uitgever / Publisher
    Delft University of Technology - Faculty of Technology, Policy and Management
    Publicatiedatum / publication date
    2017
    Collections
    WODC Publications

    entitlement

     
    DSpace software (copyright © 2002 - 2026)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.