ceios/database/README.md
2024-09-16 15:58:15 +09:30

16 строки
1013 B
Markdown

# Cyber-Influence-Operation-Analysis
Cyber-Influence Operation Analysis: Background, Documentation, and Modelling of Cyber and Disinformation Components.
Each documented cyber-influence operation has associated with it:
1. A document which contains the following:
- A brief summary of the operation
- Resources for the information on the operation
- Necessary contextual information and timeline of the operation. This includes identifying where tactics, techniques, and procedures are used.
- The operation textually modelled using the MITRE ATT&CK Framework and DISARM Framework.
2. An Attack Flow '.afb' file. Here the operation is modelled using the Attack Flow Builder
3. The resources for the data, captured in the state found when resesarching the operation.
See the modified Disarm-Attack Flow Builder here: https://github.com/Uni-JimMorris/disarm-attack-flow
See Mitre's Original Attack Flow builder here: https://center-for-threat-informed-defense.github.io/attack-flow/ui/