padding 发表于 2025-3-25 06:26:42

http://reply.papertrans.cn/25/2418/241710/241710_21.png

制定 发表于 2025-3-25 08:47:39

http://reply.papertrans.cn/25/2418/241710/241710_22.png

semiskilled 发表于 2025-3-25 12:20:54

Bridging the Classical D&D and Cyber Security Domains,s the D&D matrix to cyber security, and then outlines a set of techniques for applying D&D in the cyber security context. These descriptions can be combined with the cyber-D&D TTP taxonomy in Appendix A to guide understanding of how D&D is used in the cyber domain. We examine the organizational requ

态度暖昧 发表于 2025-3-25 16:25:08

http://reply.papertrans.cn/25/2418/241710/241710_24.png

生存环境 发表于 2025-3-25 23:18:46

http://reply.papertrans.cn/25/2418/241710/241710_25.png

一条卷发 发表于 2025-3-26 04:01:28

Exercising Cyber-D&D, research experiment referred to as SLX II in which Blue network defense personnel used cyber-D&D against a Red threat actor. This experiment demonstrated the value of adding D&D TTPs to traditional CND and the importance of cyber intelligence. The inclusion of D&D TTPs led to the successful neutral

催眠 发表于 2025-3-26 08:08:02

Considerations, Adaptation, and Sharing,hat they can still achieve their goals even when it seems that everything is going wrong. This chapter brings together considerations for the cyber-D&D planner, covering the realities of utilizing cyber-D&D. Applying cyber-D&D poses risk and has the potential for unintended consequences. Cyber-D&D o

gentle 发表于 2025-3-26 09:00:02

Countering Denial and Deception,ing theories and techniques of counterdeception and adapt them for usage by cyber defenders in conjunction with their deception chains and deception campaigns. In so doing we present a cyber-CD process model, then apply it to the Mandiant APT1 case. Our goal is to suggest how cyber defenders can use

威胁你 发表于 2025-3-26 13:48:29

Capability Maturity Model,o assess their readiness to conduct cyber-D&D operations. The systematic framework provided by a CMM enables organizations to implement a strategic cyber-D&D capability, assess the maturity of that capability over time, and estimate the capabilities of cyber adversaries.

不如乐死去 发表于 2025-3-26 19:07:07

Felicia L. Wilczenski,Susan M. Coomeychain, utilizing cyber-D&D TTPs always involves challenges and potential drawbacks. We review some of these to inform and encourage cyber-D&D cadres to explore these considerations early in the planning phases of cyber-D&D operations.
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Cyber Denial, Deception and Counter Deception; A Framework for Supp Kristin E. Heckman,Frank J. Stech,Alexander W. Tso Book 2015 Springer I