2019-01-07 21:49:20 +01:00
{
"namespace" : "information-security-data-source" ,
"description" : "Taxonomy to classify the information security data sources." ,
"refs" : [
"https://www.sciencedirect.com/science/article/pii/S0167404818304978"
] ,
"version" : 1 ,
"predicates" : [
{
"value" : "originality" ,
"expanded" : "Originality" ,
"description" : "Originality and novelty of the provided information"
} ,
{
"value" : "timeliness-sharing-behavior" ,
"expanded" : "Timeliness sharing behavior" ,
"description" : "Timeliness of the provided information"
} ,
{
"value" : "type-of-information" ,
"expanded" : "Type of information" ,
"description" : "Type of provided information"
} ,
{
"value" : "integrability-format" ,
"expanded" : "Integrability format" ,
"description" : "Level of integrability format for the provided information"
} ,
{
"value" : "integrability-interface" ,
"expanded" : "Integrability interface" ,
"description" : "Level of integrability interface for the provided information"
} ,
{
"value" : "type-of-source" ,
"expanded" : "Type of source" ,
"description" : "Types of information security data source"
} ,
{
"value" : "trustworthiness-creditabilily" ,
"expanded" : "Trustworthiness creditability" ,
"description" : "Source of the creditability"
} ,
{
"value" : "trustworthiness-traceability" ,
"expanded" : "Trustworthiness traceability" ,
"description" : "Traceability of the provided information"
} ,
{
"value" : "trustworthiness-feedback-mechanism" ,
"expanded" : "Trustworthiness feedback mechanism" ,
"description" : "Feedback such as user ratings or comments regarding the usefulness of the provided information"
}
] ,
"values" : [
{
"predicate" : "type-of-information" ,
"entry" : [
{
"value" : "vulnerability" ,
"expanded" : "Vulnerability" ,
2019-01-07 21:58:59 +01:00
"description" : "Information regarding a weakness of an asset which might be exploited by a threat"
2019-01-07 21:49:20 +01:00
} ,
{
"value" : "threat" ,
"expanded" : "Threat" ,
2019-01-07 21:58:59 +01:00
"description" : "Information regarding the potential cause on an unwanted incident"
2019-01-07 21:49:20 +01:00
} ,
{
"value" : "countermeasure" ,
"expanded" : "Countermeasure" ,
2019-01-07 21:58:59 +01:00
"description" : "Information regarding any administrative, managerial, technical or legal control that is used to counteract an information security risk"
2019-01-07 21:49:20 +01:00
} ,
{
"value" : "attack" ,
"expanded" : "Attack" ,
2019-01-07 21:58:59 +01:00
"description" : "Information regarding any unauthorized attempt to access, alter or destroy an asset"
2019-01-07 21:49:20 +01:00
} ,
{
"value" : "risk" ,
"expanded" : "Risk" ,
2019-01-07 21:58:59 +01:00
"description" : "Information describing the consequences of a potential event, such as an attack"
2019-01-07 21:49:20 +01:00
} ,
{
"value" : "asset" ,
"expanded" : "Asset" ,
2019-01-07 21:58:59 +01:00
"description" : "Information regarding any object or characteristic that has value to an organization"
2019-01-07 21:49:20 +01:00
}
]
2019-01-07 22:05:04 +01:00
} ,
{
"predicate" : "originality" ,
"entry" : [
{
"value" : "original-source" ,
"expanded" : "Original source" ,
"description" : "Information originates from the data sources which publish their own information"
} ,
{
"value" : "secondary-source" ,
"expanded" : "Secondary source" ,
"description" : "Information is integrated or copied from another information security data source"
}
]
2019-01-08 07:45:23 +01:00
} ,
{
"predicate" : "timeliness-sharing-behavior" ,
"entry" : [
{
"value" : "routine-sharing" ,
"expanded" : "Routine sharing" ,
"description" : "Information is published at a specific point in time on a regular basis, such as daily, weakly or monthly reports"
} ,
{
"value" : "incident-specific" ,
"expanded" : "Incident specific" ,
"description" : "Information is published whenever news are available or a new incident occurs"
}
]
} ,
{
"predicate" : "integrability-format" ,
"entry" : [
{
"value" : "structured" ,
"expanded" : "Structured" ,
"description" : "The provided security information is available in an standardized and structured data format such as MISP core format"
} ,
{
"value" : "unstructured" ,
"expanded" : "Unstructured" ,
"description" : "The provided security information is available in unstructured form without following a common data representation format"
}
]
} ,
{
"predicate" : "integrability-interface" ,
"entry" : [
{
"value" : "no-interface" ,
"expanded" : "No interface" ,
"description" : "The information security data source doesn’ t provide any interface to access the information"
} ,
{
"value" : "api" ,
"expanded" : "API" ,
"description" : "The information security data source provides an application programming interface (APIs) to obtain the provided information"
} ,
{
"value" : "rss-feeds" ,
"expanded" : "RSS Feeds" ,
"description" : "The information security data source provides an RSS Feed to keep track of the provided information"
} ,
{
"value" : "export" ,
"expanded" : "Export" ,
"description" : "The information security data source provides an interface to export contents as XML, JSON or plain text"
}
]
2019-01-07 21:49:20 +01:00
}
]
}