<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://70.231.62.181/index.php?action=history&amp;feed=atom&amp;title=Common_Attack_Pattern_Enumeration_and_Classification</id>
	<title>Common Attack Pattern Enumeration and Classification - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://70.231.62.181/index.php?action=history&amp;feed=atom&amp;title=Common_Attack_Pattern_Enumeration_and_Classification"/>
	<link rel="alternate" type="text/html" href="http://70.231.62.181/index.php?title=Common_Attack_Pattern_Enumeration_and_Classification&amp;action=history"/>
	<updated>2026-04-22T10:32:40Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>http://70.231.62.181/index.php?title=Common_Attack_Pattern_Enumeration_and_Classification&amp;diff=11415624&amp;oldid=prev</id>
		<title>imported&gt;Rasptae at 20:36, 10 December 2025</title>
		<link rel="alternate" type="text/html" href="http://70.231.62.181/index.php?title=Common_Attack_Pattern_Enumeration_and_Classification&amp;diff=11415624&amp;oldid=prev"/>
		<updated>2025-12-10T20:36:00Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{refimprove|date=April 2022}}&lt;br /&gt;
&lt;br /&gt;
{{Short description|Framework for describing and categorizing cyberattacks}}&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Common Attack Pattern Enumeration and Classification&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;CAPEC&amp;#039;&amp;#039;&amp;#039;) is a catalog of known cyber security attack patterns&amp;lt;ref&amp;gt;{{Cite journal |last1=Kanakogi |first1=Kenta |last2=Washizaki |first2=Hironori |last3=Fukazawa |first3=Yoshiaki |last4=Ogata |first4=Shinpei |last5=Okubo |first5=Takao |last6=Kato |first6=Takehisa |last7=Kanuka |first7=Hideyuki |last8=Hazeyama |first8=Atsuo |last9=Yoshioka |first9=Nobukazu |date=2022-03-27 |title=Comparative Evaluation of NLP-Based Approaches for Linking CAPEC Attack Patterns from CVE Vulnerability Information |journal=Applied Sciences |language=en |volume=12 |issue=7 |pages=3400 |doi=10.3390/app12073400 |issn=2076-3417|doi-access=free }}&amp;lt;/ref&amp;gt; to be used by cyber security professionals to prevent attacks.&amp;lt;ref&amp;gt;{{Cite web |title=fnCyber™ Go Cyber Resilient Enterprise Cyber Security Consulting &amp;amp; Solutions |url=https://www.fncyber.com/web-of-trust-article/understand-common-attack-patterns |access-date=2022-04-27 |website=www.fncyber.com |language=en}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Originally released in 2007 by the [[United States Department of Homeland Security]], the project began as an initiative of the Office of Cybersecurity and Communication, and it is now supported by [[Mitre Corporation]] and governed under a board of corporate representatives.&amp;lt;ref&amp;gt;{{Cite web | url=https://capec.mitre.org/about/index.html | title=CAPEC - About CAPEC }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
==See also==&lt;br /&gt;
*[[ATT&amp;amp;CK]] - another Mitre framework&lt;br /&gt;
==External links==&lt;br /&gt;
* [https://capec.mitre.org MITRE CAPEC]&lt;br /&gt;
&lt;br /&gt;
{{MITRE security ontologies}}&lt;br /&gt;
[[Category:Classification systems]]&lt;br /&gt;
[[Category:Computer standards]]&lt;br /&gt;
[[Category:Mitre Corporation]]&lt;br /&gt;
{{computer-security-stub}}&lt;/div&gt;</summary>
		<author><name>imported&gt;Rasptae</name></author>
	</entry>
</feed>