Yes, there are profiles for attackers which can be used. They are broken into archetypes which are clustered around motivation, objectives, skills, resources, etc. This gives a good indication of what they are capable of accomplishing and the methods most likely to be be used.
You are viewing a single comment's thread from: