- CheckMates
- :
- Products
- :
- Quantum
- :
- IoT Protect
- :
- CYBERTHREAT PROFILES
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
CYBERTHREAT PROFILES
attached document is all about Computer Security for Nuclear Security. I believe less relevant for most of us here.
however starting at page 67, I found some details that might be relevant for most of us. the Cyberthreats are presented in a very simple manner over table where we can learn what is the threat, what are the skills and tactics required to contact that attack. not less important what are the motivation and intentions of the attacker.
below you can find an example of one of the tables from the document.
1 Reply
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
