SecureByDesign-Playbook

Deep Dive into Assets

To develop:

Chained asset impacts (attacking one to get to another, attacking several to get combination effects)

Supply Chains

Other Impact Categories

Military: (Detect) Disrupt, Deny, Degrade, Destroy, Deceive,

Chain impacts to create Complex Attacks: stealing details that allow presence that allow more stealing that allow theft

Find, Fix, Finish, Exploit, etc etc

Find Fix, Track, Target, Engage, Assess

Find, Fix, Flank, Finish

What does ‘fix’ look like in cyberspace? Attention? Cut comms route between agent and operator?