1.5 KiB
1.5 KiB
AMITT Response types:
| id | name | summary |
|---|---|---|
| D1 | Detect | discover or discern the existence, presence, or fact of an intrusion into information systems. We included Detect because that’s what everyone was doing - looking, not reacting, and we wanted them to get that out of their systems. |
| D2 | Deny | prevent disinformation creators from accessing and using critical information, systems, and services. |
| D3 | Disrupt | break or interrupt the flow of information. |
| D4 | Degrade | reduce the effectiveness or efficiency of adversary command and control or communications systems, and information collection efforts or means. |
| D5 | Deceive | cause a person to believe what is not true. military deception seeks to mislead adversary decision makers by manipulating their perception of reality. |
| D6 | Destroy | damage a system or entity so badly that it cannot perform any function or be restored to a usable condition without being entirely rebuilt. |
| D7 | Deter | discourage. We added Deter to the list as a potentially useful category too |