chg: [doc] summary updated

pull/177/head
Alexandre Dulaunoy 2020-01-09 11:38:35 +01:00
parent 0004a5b5f1
commit 8dd38c9b56
1 changed files with 45 additions and 8 deletions

View File

@ -1,5 +1,5 @@
# Taxonomies # Taxonomies
- Generation date: 2019-11-05 - Generation date: 2020-01-09
- license: CC-0 - license: CC-0
- description: Manifest file of MISP taxonomies available. - description: Manifest file of MISP taxonomies available.
@ -253,11 +253,11 @@
- sensitivity-classification - sensitivity-classification
### cssa ### cssa
- description: The CSSA agreed sharing taxonomy. - description: The CSSA agreed sharing taxonomy.
- version: 7 - version: 8
- Predicates - Predicates
- sharing-class - sharing-class
- origin
- report - report
- origin
- analyse - analyse
### cyber-threat-framework ### cyber-threat-framework
- description: Cyber Threat Framework was developed by the US Government to enable consistent characterization and categorization of cyber threat events, and to identify trends or changes in the activities of cyber adversaries. https://www.dni.gov/index.php/cyber-threat-framework - description: Cyber Threat Framework was developed by the US Government to enable consistent characterization and categorization of cyber threat events, and to identify trends or changes in the activities of cyber adversaries. https://www.dni.gov/index.php/cyber-threat-framework
@ -501,7 +501,7 @@
- event-class - event-class
### exercise ### exercise
- description: Exercise is a taxonomy to describe if the information is part of one or more cyber or crisis exercise. - description: Exercise is a taxonomy to describe if the information is part of one or more cyber or crisis exercise.
- version: 5 - version: 7
- Predicates - Predicates
- cyber-europe - cyber-europe
- cyber-storm - cyber-storm
@ -510,9 +510,15 @@
- cyber-coalition - cyber-coalition
- pace - pace
- cyber-sopex - cyber-sopex
### failure-mode-in-machine-learning
- description: The purpose of this taxonomy is to jointly tabulate both the of these failure modes in a single place. Intentional failures wherein the failure is caused by an active adversary attempting to subvert the system to attain her goals either to misclassify the result, infer private training data, or to steal the underlying algorithm. Unintentional failures wherein the failure is because an ML system produces a formally correct but completely unsafe outcome.
- version: 1
- Predicates
- unintended-failures-summary
- intentionally-motivated-failures-summary
### false-positive ### false-positive
- description: This taxonomy aims to ballpark the expected amount of false positives. - description: This taxonomy aims to ballpark the expected amount of false positives.
- version: 4 - version: 5
- Predicates - Predicates
- risk - risk
- confirmed - confirmed
@ -614,11 +620,11 @@
- controls-law - controls-law
- controls-personal - controls-personal
- controls-security - controls-security
- controls-risk-governance
- contracts-arrangement - contracts-arrangement
- contracts-rights - contracts-rights
- contracts-obligation - contracts-obligation
- contracts-jurisdiction - contracts-jurisdiction
- controls-risk-governance
### gsma-attack-category ### gsma-attack-category
- description: Taxonomy used by GSMA for their information sharing program with telco describing the attack categories - description: Taxonomy used by GSMA for their information sharing program with telco describing the attack categories
- version: 1 - version: 1
@ -697,6 +703,30 @@
- name - name
- version - version
- id - id
### iep2-policy
- description: Forum of Incident Response and Security Teams (FIRST) Information Exchange Policy (IEP) v2.0 Policy
- version: 1
- Predicates
- id
- name
- description
- iep_version
- start_date
- end_date
- encrypt_in_transit
- permitted_actions
- affected_party_notifications
- tlp
- attribution
- unmodified_resale
- external_reference
### iep2-reference
- description: Forum of Incident Response and Security Teams (FIRST) Information Exchange Policy (IEP) v2.0 Reference
- version: 1
- Predicates
- id_ref
- url
- iep_version
### ifx-vetting ### ifx-vetting
- description: The IFX taxonomy is used to categorise information (MISP events and attributes) to aid in the intelligence vetting process - description: The IFX taxonomy is used to categorise information (MISP events and attributes) to aid in the intelligence vetting process
- version: 3 - version: 3
@ -761,7 +791,7 @@
- other - other
### iot ### iot
- description: Internet of Things taxonomy, based on IOT UK report https://iotuk.org.uk/wp-content/uploads/2017/01/IOT-Taxonomy-Report.pdf - description: Internet of Things taxonomy, based on IOT UK report https://iotuk.org.uk/wp-content/uploads/2017/01/IOT-Taxonomy-Report.pdf
- version: 1 - version: 2
- Predicates - Predicates
- TCom - TCom
- SSL - SSL
@ -807,7 +837,7 @@
- memory-classification - memory-classification
### misp ### misp
- description: MISP taxonomy to infer with MISP behavior or operation. - description: MISP taxonomy to infer with MISP behavior or operation.
- version: 10 - version: 11
- Predicates - Predicates
- ui - ui
- api - api
@ -819,6 +849,7 @@
- should-not-sync - should-not-sync
- tool - tool
- misp2yara - misp2yara
- ids
### monarc-threat ### monarc-threat
- description: MONARC Threats Taxonomy - description: MONARC Threats Taxonomy
- version: 1 - version: 1
@ -842,6 +873,12 @@
- malware-type - malware-type
- malware-platform - malware-platform
- malware-family - malware-family
### mwdb
- description: Malware Database (mwdb) Taxonomy - Tags used across the platform
- version: 2
- Predicates
- location_type
- family
### nato ### nato
- description: NATO classification markings. - description: NATO classification markings.
- version: 2 - version: 2