Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®
dc.contributor.author | Adams, Emily K. | |
dc.date.accessioned | 2022-08-17T15:08:17Z | |
dc.date.available | 2022-08-17T15:08:17Z | |
dc.date.issued | 2022-08 | |
dc.description.abstract | In this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows. | en |
dc.description.sponsorship | National Science Foundation (NSF) - grant 1839900 | en |
dc.identifier.uri | https://hdl.handle.net/2022/28045 | |
dc.language.iso | en | en |
dc.rights | https://creativecommons.org/licenses/by-sa/4.0/ | en |
dc.subject | cybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CK | en |
dc.title | Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK® | en |
dc.type | Technical Report | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®.pdf
- Size:
- 154.76 KB
- Format:
- Adobe Portable Document Format
- Description:
Collections
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.