Page 73 - Cyber Warnings
P. 73







Through the Table above, it’s presented how the given source’s attributes could be defined.
Also, we would suggest attempting this approach for the certain period of time trying to grade
every single day spent with the informant.

From time to time, the source may change its status being (1) ad hoc, (2) reliable or (3) trusted
depending on the represented criteria.

With the one of the previous reports we would provide some definitions regarding the source’s
types. The valuing could go from F until A, but we would recommend using the numerical
system of marking applying the grades from 1 to 5.

This would be helpful for the reason of easier data processing and calculating the average
values. Such an average value could get used to the defining of the source’s status following
the good empirical methodologies.

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia.

She also serves as a Reviewer at the Journal of Computer Sciences and
Applications and the International Journal of Cyber Security and Digital
Forensics. She writes for American and Asia-Pacific security magazines. She is a volunteer with
the American corner of Subotica as well as a lecturer with the local engineering society.
























73 Cyber Warnings E-Magazine – February 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   68   69   70   71   72   73   74   75   76   77   78