Diamond Model

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

adversary

An entity that opposes or acts against another, often in a competitive or hostile manner, typically analyzed within the context of cybersecurity or threat modeling.

2
New cards

Adversary Operator

A person or group that executes attacks or exploits vulnerabilities in systems to achieve specific objectives, often analyzed in cybersecurity frameworks.

3
New cards

Adversary Customer

An entity or individual that is a target or intended victim of adversarial actions, often seeking to defend against threats or attacks in cybersecurity contexts.

4
New cards

Victim

target of the adversary. can be an organization, person, target email address, IP address, domain, etc.

5
New cards

Victim Personae

the people and organizations being targeted and whose assets are being attacked and exploited.

6
New cards

Victim Assets

the attack surface and include the set of systems, networks, email addresses, hosts, IP addresses, social networking accounts, etc., to which the adversary will direct their capabilities.

7
New cards

Capability

the tools, techniques, and resources that an adversary employs to exploit a victim or achieve their objectives. tactics, techniques, and procedures (TTPs). 

8
New cards

Capability Capacity

All of the vulnerabilities and exposures that the individual capability can use. 

9
New cards

Adversary Arsenal

the complete set of tools, techniques, and methods an adversary has available to carry out attacks against a target.

10
New cards

Infrastructure

physical or logical interconnections that the adversary uses to deliver a capability or maintain control of capabilities.

11
New cards

Type 1 Infrastructure

infrastructure controlled or owned by the adversary. 


12
New cards

Type 2 Infrastructure

infrastructure controlled by an intermediary. Sometimes the intermediary might or might not be aware of it.

13
New cards

Service Providers

organizations that provide services considered critical for the adversary availability of Type 1 and Type 2 Infrastructures, for example, Internet Service Providers, domain registrars, and webmail providers.

14
New cards

social-political

factors that influence social behavior and political systems, often impacting the adversary's strategies and operations.