Cyber security and online data protection with tacit secured encryption software . Concept of smart digital transformation and technology disruption that changes global trends in new information era .

The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a common language and framework for representing and exchanging cyber threat information. This can help to improve the efficiency and effectiveness of cyber threat intelligence sharing and collaboration.

The STIX2.1 data model is based on the object-oriented paradigm, which means that it is composed of objects that represent different types of cyber threat information. These objects can be related to each other through a set of defined relationships. This makes it possible to represent complex cyber threat information in a structured and unambiguous way.

The STIX2.1 data model is also extensible, which means that it can be customized to meet the specific needs of different organizations. This makes it a flexible and versatile tool that can be used to represent a wide range of cyber threat information.

Overall, the STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area. It provides a common language and framework for representing and exchanging cyber threat information, which can help to improve the efficiency and effectiveness of cyber threat intelligence sharing and collaboration.

Here are some specific benefits of using the STIX2.1 data model:

  • Improved communication and collaboration: The STIX2.1 data model provides a common language for communicating about cyber threats, which can help to improve communication and collaboration between different organizations.
  • Increased efficiency: The STIX2.1 data model can help to increase the efficiency of cyber threat intelligence sharing by providing a standardized way to represent and exchange information.
  • Improved decision-making: The STIX2.1 data model can help to improve decision-making by providing a more complete and accurate picture of the cyber threat landscape.
  • Enhanced security: The STIX2.1 data model can help to enhance security by providing a way to share information about cyber threats in a secure and controlled manner.

An important addition that is in the works

With some modifications, the STIX data model can be used to characterize disinformation. The STIX data model can be formally extended to describe the characteristics of disinformation, such as its purpose, target, and methods. The forerunner in defining a disinformation model is the DISARM Foundation. This organization is currently working with OASIS-Open to establish an Open Project for defining the data objects that can be used with STIX2.1 for sharing machine readable threat intelligence (MRTI) that includes features of a disinformation campaign.

The extended STIX data model that will incorporate key DISARM constructs can be used to describe disinformation in a number of ways. For example, it can be used to describe the following aspects of disinformation:

The purpose of the disinformation, such as to influence public opinion or to damage the reputation of an organizationn (e.g., a Narrative).
The target of the disinformation, such as a specific audience or a particular group of people.
The methods used to spread the disinformation, such as social media, email, or traditional media (i.e., a Channel).
The characteristics of the disinformation, such as its language, memes and content.

This extended STIX data model can also be used to describe the relationships between different pieces of disinformation, such as whether different narratives or memes are part of the same campaign or whether they are being used to support each other.

Another ongoing revision

STIX data model watchers might be aware that the Incident STIX Domain Object (SDO) was issued as a ‘stub’ in the most recent version of the standard. Since that version was published a Working Group within the CTI TC has been further developing the Incident SDO using the Extension Definition approach defined in Section 7.3 of the standard.

Stay tuned for more updates on this important development!

By Jane

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Translate ยป