Uploaded by Андрей Жулин

текст

advertisement
The structured expression of threat information, or STIX (Structured Threat Information
eXpression), is a standardized language developed by MITER and the OASIS Technical
Committee on Cyber Threat Information Analysis (CTI) and describing information on cyber
threats. It has been adopted as an international standard by various communities and
organizations for the exchange of analytical information. This language is intended to be
exchanged via TAXII, but can be used in other ways. The STIX language is structured in such a
way that users can describe the following threat characteristics:
 motivation;
 ability;
 opportunities;
 response [1].
There are several basic uses for STIX. First, it is used by threat analysts to analyze cyber
threats and threat related activities. Threat analysts also use STIX to identify patterns that may
indicate cyber threats. Any decision maker or operational staff can use STIX data to support
cyber-threat response actions, including prevention, detection, and response. The latest major
application of STIX is the exchange of information about cyber threats within the organization
and with external partners or communities that benefit from this information [2].
STIX is designed to support a number of basic use cases related to cyber threat management.
In addition, STIX provides a unifying architecture that unites a diverse set of information about
cyber threats, including:
 objects of cyber surveillance;
 indicators;
 accidents;
 tactics, methods and procedures of the enemy (including attack patterns, malware, exploits,
chains of destruction, tools, infrastructure);
 exploit targets (for example, vulnerabilities, weaknesses or configurations);
 courses of action (for example, incident response or vulnerability / weakness mitigation or
mitigation);
 cyber attacks;
 actors cyber threats [3].
STIX provides a general mechanism for accessing structured cyber threat information across
this range of use cases, improving consistency, efficiency, compatibility, and overall situational
awareness.
Download