Describe the Adversary Model of cybercrime
The Adversary Model of cybercrime involves resources, capabilities, intent, motivation, risk aversion, and access. The model was developed by security experts working on U.S. government defense initiatives to characterize the behavior of cybercriminals, in an effort to strengthen security controls.
Adversary Models in network security are intended to keep out any attempts of discovering secret data, the corruption of your data, spoofing the identity of message senders or receivers, and/or forcing system downtime. They are meant to keep an adversary from obtaining access into a network. Security is a three-step process, starting with threat prevention, then on to detection, and ending in a response. This is based upon user account access, how limited the access, and how secure it is.
First and foremost we have to make sure that we are protecting our information with proper physical security. Meaning all of the paper documents should be kept in safe location or locked in a safe. Incident identification is also very important. Discovering the threat in a timely matter and preventing it from spreading as well as reduce the damage made can be crucial. Then, we move onto the Firewall, which is used to shield access to internal network services to block an attack through pocket filtering. There are multiple security tools that can help us protect from our adversary. Personally I like Snort, Wireshark as well as Nmap. Wireshark to analyze the traffic and Nmap for port scanning are often very helpful tolls for threat prevention. Firewalls can be hardware- or software-based. Next up is the intrusion detection system, which are products designed to detect network attacks in progress. Commonly known as Antivirus as well as Antispyware they are used to stop the attack instantly upon intrusion.
For me the Adversary model is also about getting to know your adversary. Its important to gain understanding of and the ability to anticipate an adversary in order to build improved treat models. Also improved profiling of attackers at post attack and forensic levels.
The cyberterrorism grows in so many ways and forms and its very important to be updated and stay on top of the game when it comes to discovering corruption of our data, spoofing, infections as well as system downtime.