Use of Concept: cyber threat

Creator

Description

The CyWG develops a threat profile, incorporating known cybersecurity adversary objectives, resources, and Tactics, Techniques, and Procedures (TTPs) and evaluates the threat likelihood in terms of difficulty of attacks. This helps prioritize the attack surface list, to document the desired threat representation for testing, determinign, and prioritizing the adverary's desired mission-based effects. The threat profile includes:
System-relevant cybersecurity threats
VOLT report, CTMs, DITL
Service/Component CTI
Publicly available CTI

Owning Diagram A22: Analyze the Attack Surface

ICOM Details: