new: [manifest] updated

pull/217/head
Alexandre Dulaunoy 2021-09-15 13:45:38 +02:00
parent 4f16116099
commit 327b892461
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
1 changed files with 14 additions and 4 deletions

View File

@ -151,7 +151,7 @@
{ {
"description": "Criminal motivation on the dark web: A categorisation model for law enforcement. ref: Janis Dalins, Campbell Wilson, Mark Carman. Taxonomy updated by MISP Project", "description": "Criminal motivation on the dark web: A categorisation model for law enforcement. ref: Janis Dalins, Campbell Wilson, Mark Carman. Taxonomy updated by MISP Project",
"name": "dark-web", "name": "dark-web",
"version": 3 "version": 4
}, },
{ {
"description": "Data classification for data potentially at risk of exfiltration based on table 2.1 of Solving Cyber Risk book.", "description": "Data classification for data potentially at risk of exfiltration based on table 2.1 of Solving Cyber Risk book.",
@ -378,6 +378,16 @@
"name": "information-security-indicators", "name": "information-security-indicators",
"version": 1 "version": 1
}, },
{
"description": "Describes the target of cyber training and education.",
"name": "interactive-cyber-training-audience",
"version": 1
},
{
"description": "The technical setup consists of environment structure, deployment, and orchestration.",
"name": "interactive-cyber-training-technical-setup",
"version": 1
},
{ {
"description": "The interception method used to intercept traffic.", "description": "The interception method used to intercept traffic.",
"name": "interception-method", "name": "interception-method",
@ -491,7 +501,7 @@
{ {
"description": "Taxonomy to classify phishing attacks including techniques, collection mechanisms and analysis status.", "description": "Taxonomy to classify phishing attacks including techniques, collection mechanisms and analysis status.",
"name": "phishing", "name": "phishing",
"version": 4 "version": 5
}, },
{ {
"description": "After an incident is scored, it is assigned a priority level. The six levels listed below are aligned with NCCIC, DHS, and the CISS to help provide a common lexicon when discussing incidents. This priority assignment drives NCCIC urgency, pre-approved incident response offerings, reporting requirements, and recommendations for leadership escalation. Generally, incident priority distribution should follow a similar pattern to the graph below. Based on https://www.us-cert.gov/NCCIC-Cyber-Incident-Scoring-System.", "description": "After an incident is scored, it is assigned a priority level. The six levels listed below are aligned with NCCIC, DHS, and the CISS to help provide a common lexicon when discussing incidents. This priority assignment drives NCCIC urgency, pre-approved incident response offerings, reporting requirements, and recommendations for leadership escalation. Generally, incident priority distribution should follow a similar pattern to the graph below. Based on https://www.us-cert.gov/NCCIC-Cyber-Incident-Scoring-System.",
@ -511,7 +521,7 @@
{ {
"description": "Reference Security Incident Classification Taxonomy", "description": "Reference Security Incident Classification Taxonomy",
"name": "rsit", "name": "rsit",
"version": 1002 "version": 1003
}, },
{ {
"description": "Status of events used in Request Tracker.", "description": "Status of events used in Request Tracker.",
@ -620,5 +630,5 @@
} }
], ],
"url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/main/", "url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/main/",
"version": "20210621" "version": "20210915"
} }