зеркало из
https://github.com/ceios/ceios.git
synced 2025-10-29 12:06:04 +02:00
Update README.md
Этот коммит содержится в:
родитель
eb5c281bf4
Коммит
be229fe0b1
@ -10,6 +10,10 @@ Each documented cyber-influence operation has associated with it:
|
|||||||
2. An Attack Flow '.afb' file. Here the operation is modelled using the Attack Flow Builder
|
2. An Attack Flow '.afb' file. Here the operation is modelled using the Attack Flow Builder
|
||||||
3. The resources for the data, captured in the state found when resesarching the operation.
|
3. The resources for the data, captured in the state found when resesarching the operation.
|
||||||
|
|
||||||
See the modified Disarm-Attack Flow Builder here: https://github.com/Uni-JimMorris/disarm-attack-flow
|
## The strongest examples of our database are:
|
||||||
|
1. APT 2017 French election campaign
|
||||||
|
2. GRU 2016 US election campaign
|
||||||
|
3. IRA 2016 FaceMusic Malware campaign
|
||||||
|
|
||||||
|
|
||||||
See Mitre's Original Attack Flow builder here: https://center-for-threat-informed-defense.github.io/attack-flow/ui/
|
See Mitre's Original Attack Flow builder here: https://center-for-threat-informed-defense.github.io/attack-flow/ui/
|
||||||
|
|||||||
Загрузка…
x
Ссылка в новой задаче
Block a user