Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®

dc.contributor.authorAdams, Emily K.
dc.date.accessioned2022-08-17T15:08:17Z
dc.date.available2022-08-17T15:08:17Z
dc.date.issued2022-08
dc.description.abstractIn this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows.
dc.description.sponsorshipNational Science Foundation (NSF) - grant 1839900
dc.identifier.urihttps://hdl.handle.net/2022/28045
dc.language.isoen
dc.rightsThis work is under a CC BY-SA license. You are free to copy and redistribute the material in any format as well as remix, transform, and build upon the material as long as you give appropriate credit to the original creator, provide a link to the license, and indicate any changes made. You must distribute any contributions under an identical license.
dc.rights.urihttps://creativecommons.org/licenses/by-sa/4.0/
dc.subjectcybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CK
dc.titleIdentifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®
dc.typeTechnical Report

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®.pdf
Size:
154.76 KB
Format:
Adobe Portable Document Format
Description:
Can’t use the file because of accessibility barriers? Contact us