Explicitely set values to null if there are none
parent
0a6549d886
commit
7f63453c0f
|
@ -23,5 +23,6 @@
|
||||||
"expanded": "RESTREINT UE/EU RESTRICTED",
|
"expanded": "RESTREINT UE/EU RESTRICTED",
|
||||||
"description": "Information and material the unauthorised disclosure of which could be disadvantageous to the interests of the European Union or of one or more of the Member States."
|
"description": "Information and material the unauthorised disclosure of which could be disadvantageous to the interests of the European Union or of one or more of the Member States."
|
||||||
}
|
}
|
||||||
]
|
],
|
||||||
|
"values": null
|
||||||
}
|
}
|
||||||
|
|
|
@ -32,5 +32,6 @@
|
||||||
"value": "Actions on Objectives",
|
"value": "Actions on Objectives",
|
||||||
"expanded": "Only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives. Typically, this objective is data exfiltration which involves collecting, encrypting and extracting information from the victim environment; violations of data integrity or availability are potential objectives as well. Alternatively, the intruders may only desire access to the initial victim box for use as a hop point to compromise additional systems and move laterally inside the network."
|
"expanded": "Only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives. Typically, this objective is data exfiltration which involves collecting, encrypting and extracting information from the victim environment; violations of data integrity or availability are potential objectives as well. Alternatively, the intruders may only desire access to the initial victim box for use as a hop point to compromise additional systems and move laterally inside the network."
|
||||||
}
|
}
|
||||||
]
|
],
|
||||||
|
"values": null
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue