• Home
  • The Framework
  • Guidebook
  • Contributors

The Framework

Top level

Top-level TREKS cybersecurity framework

Targeting Pt. 1

What function(s) does the SV perform?

Targeting Pt. 2

Why is the SV being targeted?

Reconnaissance and Exploitation

Reconnaissance

What vectors enable exploitation of SV subsystems to achieve kill-chain effects?

Exploitation

What SV subsystem(s) need to be exploited to pre-position or execute the kill-chain effect?

Terms of Use

 

LICENSE

Jacob Oakley hereby grants you a non-exclusive, royalty-free license to use TREKS for research, development, and commercial purposes. Any copy you make for such purposes is authorized provided that you reproduce Jacob Oakley's copyright designation and this license in any such copy.

"© 2023 Jacob Oakley. This work is reproduced and distributed with the permission of Jacob Oakley."

DISCLAIMERS

ALL DOCUMENTS AND THE INFORMATION CONTAINED THEREIN ARE PROVIDED ON AN "AS IS" BASIS AND THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE MITRE CORPORATION, ITS BOARD OF TRUSTEES, OFFICERS, AGENTS, AND EMPLOYEES, DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

See our FAQ for more information on how to use and represent the TREKS name.

Copyright © 2023 TREKS Cybersecurity Framework - All Rights Reserved.


Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept