[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [cti] Attack Motivations
.02: Like Sophistication, we should directly adopt an existing, well vetted, Taxonomy.
@Patrick/ISightPartners or @EclecticIQ: Can you provide reference?
Patrick Maroney
President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org All,
Intrusion Sets and Threat Actors both use the Attack Motivations vocabulary. Right now we have the following terms in that vocab:
I propose that we add the following thee terms to this list, I missed them when I was putting this list together.
Thanks,
Bret
Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO
Blue Coat Systems
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
|
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]