Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®

dc.contributor.authorAdams, Emily K.
dc.date.accessioned2022-08-17T15:08:17Z
dc.date.available2022-08-17T15:08:17Z
dc.date.issued2022-08
dc.description.abstractIn this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows.en
dc.description.sponsorshipNational Science Foundation (NSF) - grant 1839900en
dc.identifier.urihttps://hdl.handle.net/2022/28045
dc.language.isoenen
dc.rightshttps://creativecommons.org/licenses/by-sa/4.0/en
dc.subjectcybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CKen
dc.titleIdentifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®en
dc.typeTechnical Reporten
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®.pdf
Size:
154.76 KB
Format:
Adobe Portable Document Format
Description:
If you need an accessible version of this item, please email your request to iusw@iu.edu so that they may create one and provide it to you.