Further reading
- The Sliding Scale of Cyber Security:
https://www.sans.org/reading-room/whitepapers/ActiveDefense/paper/36240
- Framework for Improving Critical Infrastructure cybersecurity:
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
- Cyber Threat Actors from Center for Internet Security:
https://www.cisecurity.org/spotlight/cybersecurity-spotlight-cyber-threat-actors/
- Threat Intelligence Naming Conventions: Threat Actors, & Other Ways of Tracking Threats by Rob M. Lee:
https://www.youtube.com/watch?v=3CUNlgQBwc4
- Diamond Model of Intrusion Analysis:
https://www.threatintel.academy/diamond/
- Cyber Ranges from NIST NICE:
https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdf
- MITRE APT3 adversary emulation plan:
https://attack.mitre.org/docs/APT3_Adversary_Emulation_Plan.pdf
- The Difference Between Cybersecurity Simulation vs Cybersecurity Emulation by Scythe: