As mentioned previously, the bigger picture or the risk context has two sides.

First, there is the users perspective, where the focus is on what the user is aware of and what elements does the user understand. This has been detailed in the users perspective in the risk context post.

Second, there is the adversary perspective, where the focus is on what the adversary sees and how the adversary targets the users assets.

“Know your enemy and know yourself and you can fight a hundred battles without disaster.” Lao Tzu

The Adversary

various-adversaries-v0.1

An adversary is any other actor or entity that has an interest that either conflicts with the users interest, either needs to profit from the users interest in one way or another.

Most people would envision "the bad guys" out there wearing a hoodie in front of a PC trying to steal their money. Adversaries are more than that, hence the reason for mentioning "entities" as well.

The most common adversaries relevant to the average internet users are listed below :

Adversary goal

Based on the adversary we can quickly assume what kind of goals and motivations they have.

Typical goals for adversaries include but are not limited to the below :

  • Financial - as mentioned before, cybercrime is big business. In many cases, it's also an opportunity for easy money, be it either for teenagers or organized crime groups
  • Political - nowadays making a political impact and proving a point can be much more easily done online than rallying tens of thousands of people in a public square.
  • Personal - these motivations vary, because some people commit online crime just because they can and they want to prove that. Or just because they're bored. Others can be a personal vendetta, where an ex-employee wants to get back at his former boss for firing him. Others can be due to jelousy or any kind of human emotion.

Adversary activity and actions

various-threats-v0.1

As examples and based on the goals and motivations above, an adversary would engage in one of the activities below :

The examples above follows a simple structure

ACTION + ASSET

In other words, in order to accomplish the goals, the adversary will target the users assets either directly or through the users activities. This is the reason why the adversary activity is seen as a threat by the user.