Top-level TREKS cybersecurity framework
What function(s) does the SV perform?
Why is the SV being targeted?
What vectors enable exploitation of SV subsystems to achieve kill-chain effects?
What SV subsystem(s) need to be exploited to pre-position or execute the kill-chain effect?
Jacob Oakley hereby grants you a non-exclusive, royalty-free license to use TREKS for research, development, and commercial purposes. Any copy you make for such purposes is authorized provided that you reproduce Jacob Oakley's copyright designation and this license in any such copy.
"© 2023 Jacob Oakley. This work is reproduced and distributed with the permission of Jacob Oakley."
ALL DOCUMENTS AND THE INFORMATION CONTAINED THEREIN ARE PROVIDED ON AN "AS IS" BASIS AND THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE MITRE CORPORATION, ITS BOARD OF TRUSTEES, OFFICERS, AGENTS, AND EMPLOYEES, DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
See our FAQ for more information on how to use and represent the TREKS name.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.