Methodologies and approaches useful for Cyber
1 / 1

Methodologies and approaches useful for Cyber

Author : karlyn-bohler | Published Date : 2025-08-13

Description: Methodologies and approaches useful for Cyber Threat Assessment and Cyber DBT along side with classical DBT methodology as stated in NSS10 Document SK Parulkar India parulkarskgmailcom S K Parulkar THREAT ASSESSMENT DBT The threat

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Methodologies and approaches useful for Cyber" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Methodologies and approaches useful for Cyber:
Methodologies and approaches useful for Cyber Threat Assessment and Cyber DBT along side with classical DBT methodology as stated in NSS-10 Document S.K. Parulkar, India parulkarsk@gmail.com S K Parulkar THREAT ASSESSMENT & DBT The threat assessment is a comprehensive compilation of information about all potential adversaries along with their motivation, intentions and capabilities. To evaluate the DBT the threat assessment document is processed through screening and decision-making. The main purpose of the processing is to make threats in threat assessment document more realistic and credible for nuclear facilities. In other words to find out more likelihood threats for nuclear facilities that can be used for calculating risk and then developing security protection systems for highest security assurance using graded approach. S K Parulkar PHYSICAL V/s CYBER THREATS Cyber threats are a global phenomenon not only local. It is not possible to know all the cyber adversaries, as they are spread all over the globe and hidden in cyber space and not open or known in public as in physical adversaries. No intelligent agencies can find out all the characteristics of threats, like capabilities and intensions, as they are not open or known. Cyber adversaries are location independent as they can attack from any where in the globe, which makes the task of intelligent agencies further difficult. Cyber threats are more technology intensive than physical threats so as the technology advances, cyber threats are also becoming more advance. Cyber threats are more dynamic as compare to physical threats, which are more constant without much advancement in weapon technologies S K Parulkar Cyber skill can be easily available and purchased or can be acquired in short time. So it is difficult for investigating agencies to clearly find out the capabilities of known cyber adversaries. Cyber threats can be easily carried out without any deterrent as adversaries are always hidden. So cyber threats are more dangerous. It makes more essential to implement cyber threat assessment program more rigorously. Cyber resources used in attack are easily available in the open market without any restriction and can be purchased without any issue and may not required large funds as compared to physical resources. Even if cyber adversary is caught, he may not be coming under the jurisdiction of legal framework of the country where attack has occurred. Therefore the cyber adversary can not be punished. PHYSICAL V/s CYBER THREATS S K Parulkar ISSUES WITH CLASSICAL

Download Document

Here is the link to download the presentation.
"Methodologies and approaches useful for Cyber"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

The Intersection of Social Media and Cyber-Bullying Cyber loss trends, insurance coverage and claim payouts Cyber Security Data and Cyber Liability Insurance Cyber Security 2017 Trends and Start Ups ITU-TQSDG – DUBAI  Methodologies and Tools for Auditing the Quality of Service MOBILE AND CYBER THREAT Presentation by Siphe-okuhle Fakudze, Red Teaming Approaches, Rationales,  Engagement Risks and Methodologies for   Parents This presentation has been created by the Center for Cyber Safety and Education KONCEPT OCH DESIGN FÖR EN NY EXTERN WEBBPLATS FÖR GÖTEBORGS UNIVERSITET Achieve and Maintain Command Vision for US Cyber Command9ec4c12949a4f3 [eBOOK]-Beginners guide to Hacking and Cyber Security (Comprehensive introduction to Cyber Cyber System-Centric Approach To Cyber Security and CIP