mirror of
https://github.com/DISARMFoundation/DISARMframeworks.git
synced 2025-02-24 00:49:49 -05:00
64 lines
1.8 KiB
Markdown
64 lines
1.8 KiB
Markdown
# Technique T0123: Control Information Environment through Offensive Cyberspace Operations
|
|
|
|
**Summary**: Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritise operation messaging or block opposition messaging.
|
|
|
|
**Tactic**: TA18 Drive Online Harms
|
|
|
|
|
|
| Associated Technique | Description |
|
|
| --------- | ------------------------- |
|
|
|
|
|
|
|
|
| Incident | Descriptions given for this incident |
|
|
| -------- | -------------------- |
|
|
|
|
|
|
|
|
| Counters | Response types |
|
|
| -------- | -------------- |
|
|
|
|
|
|
# Technique T0123: Control Information Environment through Offensive Cyberspace Operations
|
|
|
|
**Summary**: Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritise operation messaging or block opposition messaging.
|
|
|
|
**Tactic**: TA18 Drive Online Harms
|
|
|
|
|
|
| Associated Technique | Description |
|
|
| --------- | ------------------------- |
|
|
|
|
|
|
|
|
| Incident | Descriptions given for this incident |
|
|
| -------- | -------------------- |
|
|
|
|
|
|
|
|
| Counters | Response types |
|
|
| -------- | -------------- |
|
|
|
|
|
|
# Technique T0123: Control Information Environment through Offensive Cyberspace Operations
|
|
|
|
**Summary**: Controlling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritise operation messaging or block opposition messaging.
|
|
|
|
**Tactic**: TA18 Drive Online Harms
|
|
|
|
|
|
| Associated Technique | Description |
|
|
| --------- | ------------------------- |
|
|
|
|
|
|
|
|
| Incident | Descriptions given for this incident |
|
|
| -------- | -------------------- |
|
|
|
|
|
|
|
|
| Counters | Response types |
|
|
| -------- | -------------- |
|
|
|
|
|