home *** CD-ROM | disk | FTP | other *** search
/ Secret & Below Interoperability (Unclassified) / Secret_and_Below_Interoperability_Version_1.0_Defense_Information_Systems_Agency_June_2000.iso / Mod02 / M02_03_02.swf / texts / 4.txt < prev    next >
Text File  |  2000-03-15  |  471b  |  17 lines

  1. Identify relevant adversaries
  2. --- RECORDSEPARATOR ---
  3. Characterize each adversary with respect to:
  4. --- RECORDSEPARATOR ---
  5.     -  Resources and Capabilities
  6. --- RECORDSEPARATOR ---
  7.     -  Access
  8. --- RECORDSEPARATOR ---
  9.     -  Risk Tolerance
  10. --- RECORDSEPARATOR ---
  11.     -  Objectives
  12. --- RECORDSEPARATOR ---
  13.     -  Relative Importance of each Characteristic
  14. --- RECORDSEPARATOR ---
  15.     -  Knowledge of Attacks
  16. --- RECORDSEPARATOR ---
  17. Develop Theory of Adversarial Behavior