Properties (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
framework
|
gptkbp:availableIn |
https://attack.mitre.org
|
gptkbp:composedOf |
techniques
tactics sub-techniques |
gptkbp:developedBy |
gptkb:MITRE_Corporation
|
gptkbp:hasCollaboratedWith |
industry partners
government entities academic researchers cybersecurity organizations |
gptkbp:hasOccupation |
ATT&CK Community
|
gptkbp:hasVersion |
1.0
2.0 3.0 4.0 |
https://www.w3.org/2000/01/rdf-schema#label |
MITRE ATT&CK
|
gptkbp:includes |
detection strategies
mitigation_strategies |
gptkbp:isAttendedBy |
government agencies
non-profit organizations academic institutions private sector organizations |
gptkbp:isDocumentedIn |
ATT&CK Navigator
ATT&CK for Cloud ATT&CK for Containers ATT&CK for IoT ATT&CK for Mobile |
gptkbp:isEvaluatedBy |
vulnerability assessments
cybersecurity assessments penetration tests red team exercises |
gptkbp:isPartOf |
gptkb:MITRE_Cybersecurity_Framework
|
gptkbp:isPromotedBy |
workshops
training sessions webinars cybersecurity conferences |
gptkbp:isReferencedBy |
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-53 CIS_Controls |
gptkbp:isSupportedBy |
open-source tools
commercial tools government tools |
gptkbp:isUsedIn |
cybersecurity training
|
gptkbp:provides |
adversary behavior models
|
gptkbp:providesGuidanceOn |
security assessments
incident response plans threat modeling |
gptkbp:purpose |
cyber threat intelligence
|
gptkbp:renovated |
gptkb:MITRE_Corporation
|
gptkbp:supports |
red teaming
blue teaming |
gptkbp:usedBy |
security professionals
threat hunters incident responders |