![]() Centre d'Informations Internet de Chine百度 而每隔一段时间,它们换个剂型、规格又能成为“新药”,可以定个更高的价格,“营销”空间更大。A Community Resource for Identifying and Understanding Attacks |
About CAPECCAPEC GlossaryThis page defines specific terms used throughout CAPEC. A shared understanding of these terms is important during discussions of attack patterns and their related weaknesses. The terms are presented in an order such that each term builds off of the previous terms:
Cyber-Enabled CapabilityA cyber-enabled capability is any software enabled technology, irrespective of whether it be traditional information technology (IT), communications systems, industrial control systems, avionics, vehicle control systems, Internet of Things (IoT), or something that comes into existence next week. It also includes the interaction mechanisms such as Bluetooth, GPS, IR, Near Field Communication, USB, and other methods since these are all mechanisms for an attacker to influence the capability. When considering attacks on cyber-enabled capabilities, we must address all aspects of those capabilities and how they are defined, designed, contracted for, produced, tested, acquired, delivered, maintained, serviced, and retired or disposed of. In addition, how they are used and interacted with, such as through physical buttons, switches, menu items, input fields, and keyboard/mouse input, must also be considered. Weakness TypeA weakness type is a specific type of mistake or condition that, if left unaddressed, could under the proper conditions contribute to a cyber-enabled capability being vulnerable to attack, allowing an adversary to make items function in unintended ways. This term applies throughout the development life cycle and includes types of mistakes that occur during implementation, design, coding, or other phases. Common Weakness Enumeration (CWE™) provides a formal list of known software-related weakness types. WeaknessA weakness is a condition in a software, firmware, hardware, or service component that, under certain circumstances, could contribute to the introduction of vulnerabilities. Negative Technical ImpactA negative technical impact is the specific effect of successfully violating a reasonable security policy for the cyber-enabled capability. Denial of service, execution of unauthorized code, and bypassing protection mechanisms are examples of negative technical impacts. ExploitAn exploit (noun) is an input or action designed to take advantage of a weakness (or multiple weaknesses) and achieve a negative technical impact. The existence (even if only theoretical) of an exploit is what makes a weakness a vulnerability. VulnerabilityA vulnerability is a flaw in a software, firmware, hardware, or service component resulting from a weakness that can be exploited, causing a negative impact to the confidentiality, integrity, or availability of an impacted component or components. AttackAn attack (noun) is the use of an exploit(s) by an adversary to take advantage of a weakness(s) with the intent of achieving a negative technical impact(s). An attack is part of the bigger "Cyber Attack Lifecycle" that includes the following tasks: reconnaissance, weaponize, deliver, exploit, control, execute, and maintain. Attack PatternAn attack pattern is the common approach and attributes related to the exploitation of a weakness in a software, firmware, hardware, or service component. ViewA view in CAPEC represents a perspective with which one might look at the collection of attack patterns defined within CAPEC. There are three different types of views: graphs, explicit slices, and implicit slices. GraphA graph in CAPEC is a hierarchical representation of attack patterns based on a specific vantage point that a user may take. The hierarchy often starts with a category, followed by a meta attack pattern/standard attack pattern, and ends with a detailed attack pattern. Explicit SliceAn explicit slice in CAPEC is a subset of attack patterns that are related through some external factor. For example, a view may be used to represent mappings to external groupings like a Top-N list. Implicit SliceAn implicit slice in CAPEC is a subset of attack patterns that are related through a specific attribute. For example, a slice may refer to all attack patterns in draft status, or all existing meta attack patterns. CategoryA category in CAPEC is a collection of attack patterns based on some common characteristic. More specifically, it is an aggregation of attack patterns based on effect/intent (as opposed to actions or mechanisms, such an aggregation would be a meta attack pattern). An aggregation based on effect/intent is not an actionable attack and as such is not a pattern of attack behavior. Rather, it is a grouping of patterns based on some common criteria. Meta Attack PatternA meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high-level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. Standard Attack PatternA standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. Detailed Attack PatternA detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. More information is available — Please select a different filter. |
翻什么覆什么 | 国家的实质是什么 | 甲状腺功能是什么 | loaf是什么意思 | 山楂搭配什么泡水喝好 |
写意是什么意思 | 腰椎管狭窄吃什么药 | 梦见在天上飞是什么意思 | 人间尤物什么意思 | 尿路感染什么症状 |
黄河里有什么鱼 | 蜜蜡是什么材质 | 为什么会有流星雨 | 奥司他韦是什么药 | 什么助听器 |
双肺纹理增多增粗是什么意思 | 手上的月牙代表什么意思 | 为什么静脉曲张 | 晚上12点是什么时辰 | 为什么会梦见前男友 |
眼睛痒用什么眼药水好hcv7jop6ns5r.cn | 混合性皮肤用什么护肤品比较好hcv8jop4ns6r.cn | 病理活检是什么意思hcv7jop7ns3r.cn | 阳瘘的最佳治疗方法是什么hcv8jop1ns9r.cn | 血压是什么意思dayuxmw.com |
精索炎吃什么药最好hcv9jop0ns6r.cn | 皮肤瘙痒用什么药膏hcv7jop9ns5r.cn | 山东有什么特产hcv8jop0ns6r.cn | 山东有什么特产hcv8jop6ns9r.cn | 12月26日什么星座hcv8jop8ns8r.cn |
冲锋衣是什么意思hcv8jop3ns6r.cn | 疏朗是什么意思hcv9jop2ns9r.cn | 排卵期出血有什么症状hcv8jop0ns5r.cn | spa按摩是什么意思hcv9jop6ns7r.cn | 女性内科检查什么hcv7jop9ns3r.cn |
湖北属于什么地区hcv8jop9ns0r.cn | 回民为什么不能吃猪肉hcv9jop1ns7r.cn | 什么节气开始凉快hcv8jop2ns6r.cn | 补办医保卡需要什么资料hcv7jop6ns7r.cn | 九月3日是什么日子hcv9jop6ns9r.cn |