From a1903a598458d4a52ce23bf9c172c076d038ca63 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 3 May 2021 16:13:41 +0200 Subject: [PATCH] chg: [course-of-action] typo fixed --- course-of-action/machinetag.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/course-of-action/machinetag.json b/course-of-action/machinetag.json index 0f62b8d..f302bae 100644 --- a/course-of-action/machinetag.json +++ b/course-of-action/machinetag.json @@ -2,7 +2,7 @@ "namespace": "course-of-action", "expanded": "Courses of Action", "description": "A Course Of Action analysis considers six potential courses of action for the development of a cyber security capability.", - "version": 1, + "version": 2, "predicates": [ { "value": "passive", @@ -43,7 +43,7 @@ "expanded": "Degrading will not immediately fail an event, but it will slow down the further actions of the attacker. This tactic allows you to catch up during an incident response process, but you have to consider that the attackers may eventually succeed in achieving their objectives. Throttling bandwidth is one way to degrade an intrusion." }, { - "value": "decieve", + "value": "deceive", "expanded": "Deception allows you to learn more about the intentions of the attacker by making them think the action was successful. One way to do this is to put a honeypot in place and redirect the traffic, based on an indicator, towards the honeypot." }, {