Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®
Loading...
Can’t use the file because of accessibility barriers? Contact us
Date
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Permanent Link
Abstract
In this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows.
Table of Contents
Description
Keywords
cybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CK
Citation
Journal
DOI
Link(s) to data and video for this item
Relation
Rights
This work is under a CC BY-SA license. You are free to copy and redistribute the material in any format as well as remix, transform, and build upon the material as long as you give appropriate credit to the original creator, provide a link to the license, and indicate any changes made. You must distribute any contributions under an identical license.
https://creativecommons.org/licenses/by-sa/4.0/
https://creativecommons.org/licenses/by-sa/4.0/