You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I would like to map techniques employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. (e.g., SQL Injection, XSS, Session Fixation, Clickjacking)
The Common Attack Pattern Enumeration and Classification (CAPEC™) is the de facto standard to meet this need.
[UC-3] Incident Response and Threat Analysis | Knowledge of the attack patterns enables responders to better align mitigation strategies.
[UC-4] Compliance Analysis | Support measuring compliance with industry standards and guidelines.
[UC-5] Malware Behavior Analysis | Relate the behavior of malicious code to attack patterns.
[UC-6] Threat Characterization and Attribution | Provide assistance in characterizing and eventually supporting attribution of threats from observed attack instances.
[UC-12] Threat Modeling: Mapping relevant threats and likely actions against the specific attack surface of the software to place threat information in an objective and actionable context.
...
The text was updated successfully, but these errors were encountered:
Problem to Solve
I would like to map techniques employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. (e.g., SQL Injection, XSS, Session Fixation, Clickjacking)
The Common Attack Pattern Enumeration and Classification (CAPEC™) is the de facto standard to meet this need.
Proposed Solution
Additional Information
The text was updated successfully, but these errors were encountered: