Towards a new cyber threat actor typology
a hybrid method for the NCSC cyber security assessment
- To what extent is the current cyber actor typology validated by recent insights fromscience and cyber security practice and what design criteria for a new cyber actortypology can be identified?
- What method to develop a cyber actor typology satisfies the identified design criteriaand enhances or enriches the current cyber actor typology different cyber actors?
- To what extent can a typology be constructed based upon state-of-the art knowledgeon cyber actors and empirical data on cyber incidents, and what would the resultingtypology look like?
- Designing a method for a cyber threat actor typology
- The deductive approach - threat actor typology framework
- The inductive approach - data analysis
- A tentative new threat actor typology
- Bruijne, M. de, Eeten, M. van, Gañán, C.H., Pieters, W.
- Delft University of Technology - Faculty of Technology, Policy and Management, WODC
- Plaats uitgave:
- Delft University of Technology - Faculty of Technology, Policy and Management
- Jaar van uitgave:
- Type rapport:
For some years a cyber threat actor typology is used in the annual Cyber Security Assessment Netherlands. It has evolved over time and captures a set of actors with different motives, intentions and capabilities. In view of its age and rather intuitive development process, it is considered whether the current typology needs to be updated and improved in light of recent insights from science and cyber security practice. This report sets out to develop a new and systematic method to enable the National Cyber Security Centre (NCSC) of the National Coordinator for Security and Counterterrorism (NCTV) to continuously update its cyber actor typology. Section 3.5 contains a concise description of the framework, to be used as a standalone document. As part of the method description, a tentative new typology is developed. This can be found in Section 5.3.
The research questions which accompany the project goals were:
- Technische Universiteit Delft - Techniek Bestuur en Management
- Jaffalaan 5
- 2628 BX Delft
- Categorisering en motieven cyberactoren
- Operationele status: