Show simple item record

dc.contributor.authorBruijne, M. de
dc.contributor.authorEeten, M. van
dc.contributor.authorGañán, C.H.
dc.contributor.authorPieters, W.
dc.coverage.spatialNederland
dc.date.accessioned2021-01-22T13:13:41Z
dc.date.available2021-01-22T13:13:41Z
dc.date.issued2017
dc.identifier.urihttp://hdl.handle.net/20.500.12832/2299
dc.description.abstractFor some years a cyber threat actor typology is used in the annual Cyber Security Assessment Netherlands. It has evolved over time and captures a set of actors with different motives, intentions and capabilities. In view of its age and rather intuitive development process, it is considered whether the current typology needs to be updated and improved in light of recent insights from science and cyber security practice. This report sets out to develop a new and systematic method to enable the National Cyber Security Centre (NCSC) of the National Coordinator for Security and Counterterrorism (NCTV) to continuously update its cyber actor typology. Section 3.5 contains a concise description of the framework, to be used as a standalone document. As part of the method description, a tentative new typology is developed. This can be found in Section 5.3. The research questions which accompany the project goals were: To what extent is the current cyber actor typology validated by recent insights fromscience and cyber security practice and what design criteria for a new cyber actortypology can be identified? What method to develop a cyber actor typology satisfies the identified design criteriaand enhances or enriches the current cyber actor typology different cyber actors? To what extent can a typology be constructed based upon state-of-the art knowledgeon cyber actors and empirical data on cyber incidents, and what would the resultingtypology look like? CONTENT: 1. Introduction 2. Designing a method for a cyber threat actor typology 3. The deductive approach - threat actor typology framework 4. The inductive approach - data analysis 5. A tentative new threat actor typology
dc.publisherDelft University of Technology - Faculty of Technology, Policy and Management
dc.relation.ispartofseriesWODC Rapport 2740
dc.subjectHacking
dc.subjectDarknet
dc.subjectDelinquenten
dc.subjectDaderkenmerk
dc.subjectCybersecurity
dc.subjectComputerfraude
dc.subjectModus operandi
dc.subjectRisicogevoeligheid
dc.subjectInformatie- en communicatietechnologie
dc.subjectClassificatie
dc.subjectInformatievoorziening
dc.subjectComputercriminaliteit
dc.subjectInternet
dc.titleTowards a new cyber threat actor typology
dc.title.alternativea hybrid method for the NCSC cyber security assessment
dc.typerapport
dc.identifier.project2740
refterms.dateFOA2021-01-22T13:13:41Z
html.description.abstractFor some years a cyber threat actor typology is used in the annual Cyber Security Assessment Netherlands. It has evolved over time and captures a set of actors with different motives, intentions and capabilities. In view of its age and rather intuitive development process, it is considered whether the current typology needs to be updated and improved in light of recent insights from science and cyber security practice. This report sets out to develop a new and systematic method to enable the National Cyber Security Centre (NCSC) of the National Coordinator for Security and Counterterrorism (NCTV) to continuously update its cyber actor typology. Section 3.5 contains a concise description of the framework, to be used as a standalone document. As part of the method description, a tentative new typology is developed. This can be found in Section 5.3. The research questions which accompany the project goals were: To what extent is the current cyber actor typology validated by recent insights fromscience and cyber security practice and what design criteria for a new cyber actortypology can be identified? What method to develop a cyber actor typology satisfies the identified design criteriaand enhances or enriches the current cyber actor typology different cyber actors? To what extent can a typology be constructed based upon state-of-the art knowledgeon cyber actors and empirical data on cyber incidents, and what would the resultingtypology look like? <P></P><b>CONTENT:</b> 1. Introduction 2. Designing a method for a cyber threat actor typology 3. The deductive approach - threat actor typology framework 4. The inductive approach - data analysis 5. A tentative new threat actor typologynl_NL
dc.identifier.tuduuid:e5dd4d2c-3960-4380-8332-ee401b8865d4
dc.contributor.institutionDelft University of Technology - Faculty of Technology, Policy and Management
dc.contributor.institutionWODC
dc.source.cityDelft


Files in this item

Thumbnail
Name:
2740_Volledige_Tekst_tcm28-273 ...
Size:
2.712Mb
Format:
PDF
Thumbnail
Name:
2740_Summary_tcm28-273244.pdf
Size:
160.1Kb
Format:
PDF
Thumbnail
Name:
2740_Samenvatting_tcm28-273245.pdf
Size:
164.3Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record