Security teams looking to understand and characterize malign influence operations must pick from a range of different models aiming to do for disinformation what Lockheed Martin’s Cyber Kill Chain and MITRE’s ATT&CK Framework have done for cyber threats. Some tools feature “kill chain” in their names, and one looks especially like ATT&CK: DISARM has a grid that catalogs adversarial tactics, techniques, and procedures (TTPs) for disinformation campaigns. How do all these tools compare?
These competing models’ differences, similarities, pros, and cons are not always intuitive, especially when the names sound similar. We’ve assembled this primer to help cybersecurity and cognitive security professionals build a shared awareness of these tools, including the advantages and disadvantages of specific models when countering tomorrow’s threats. It’s in the form of an FAQ, so you can start up top if you’re brand new to kill chains or jump in where appropriate based on your existing knowledge.