Add adversary infrastructure taxonomy

pull/23/head
Alexandre Dulaunoy 2016-05-06 20:55:20 +02:00
parent 4b19d49b80
commit fa14b5051c
1 changed files with 5 additions and 0 deletions

View File

@ -11,6 +11,7 @@ The following taxonomies can be used in MISP (as local or distributed tags) or i
The following taxonomies are described: The following taxonomies are described:
- [Admiralty Scale](./admiralty-scale) - [Admiralty Scale](./admiralty-scale)
- [adversary](./adversary)
- CIRCL [Taxonomy - Schemes of Classification in Incident Response and Detection](./circl) - CIRCL [Taxonomy - Schemes of Classification in Incident Response and Detection](./circl)
- DE German (DE) [Government classification markings (VS)](./de-vs) - DE German (DE) [Government classification markings (VS)](./de-vs)
- [eCSIRT](./ecsirt) and IntelMQ incident classification - [eCSIRT](./ecsirt) and IntelMQ incident classification
@ -27,6 +28,10 @@ The following taxonomies are described:
The Admiralty Scale (also called the NATO System) is used to rank the reliability of a source and the credibility of an information. The Admiralty Scale (also called the NATO System) is used to rank the reliability of a source and the credibility of an information.
### [Adversary](./adversary)
An overview and description of the adversary infrastructure.
### CIRCL [Taxonomy - Schemes of Classification in Incident Response and Detection](./circl) ### CIRCL [Taxonomy - Schemes of Classification in Incident Response and Detection](./circl)
CIRCL Taxonomy is a simple scheme for incident classification and area topic where the incident took place. CIRCL Taxonomy is a simple scheme for incident classification and area topic where the incident took place.