Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®
| dc.contributor.author | Adams, Emily K. | |
| dc.date.accessioned | 2022-08-17T15:08:17Z | |
| dc.date.available | 2022-08-17T15:08:17Z | |
| dc.date.issued | 2022-08 | |
| dc.description.abstract | In this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows. | |
| dc.description.sponsorship | National Science Foundation (NSF) - grant 1839900 | |
| dc.identifier.uri | https://hdl.handle.net/2022/28045 | |
| dc.language.iso | en | |
| dc.rights | This work is under a CC BY-SA license. You are free to copy and redistribute the material in any format as well as remix, transform, and build upon the material as long as you give appropriate credit to the original creator, provide a link to the license, and indicate any changes made. You must distribute any contributions under an identical license. | |
| dc.rights.uri | https://creativecommons.org/licenses/by-sa/4.0/ | |
| dc.subject | cybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CK | |
| dc.title | Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK® | |
| dc.type | Technical Report |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®.pdf
- Size:
- 154.76 KB
- Format:
- Adobe Portable Document Format
- Description:
Collections
Can’t use the file because of accessibility barriers? Contact us