IntentThe intent is the "why" in threat operations. The threat's intent may vary greatly
depending upon the target, the sensitivity and value of the target's information, and the desired impacts on both the target and the threat. A threat’s intent is based on the specifics of an engagement.
A threat may simply want to gather target information. This information is typically something classified as confidential,
proprietary, or intellectual property, and if lost, would be detrimental to an organization. For example, stolen data could be provided to competitors to build and release in time with or ahead of the target.
The intent maybe to insert faulty or malicious code into the target's current software project. This code could cause failure or security vulnerabilities at software release. Manipulation scenarios are an excellent choice to support a supply chain attack scenario.
The threat may want to impact the target’s sales and possibly cause a business failure by releasing target information to the public.
Intent that directly impacts an organization should be considered during planning over intent that simply identifies technical flaws.
Share with your friends: