The Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base aims to advance our collective understanding of the technical mechanisms that insider threats have used. With this knowledge, Insider Threat Programs and Security Operations Centers will detect, mitigate, and emulate insider actions on IT systems to stop insider threats. Utilizing the Knowledge Base, cyber defenders across organizations will identify insider threat activity on IT systems and limit the damage. Capturing and sharing the Design Principles and Methodology for developing the Knowledge Base is a foundational step to establishing this community resource and enabling its broad adoption and ongoing development.
This is the LibreSilicon process specification (WIP) Please use XeLaTeX for rendering the documents
1 micron (1 um)
twin-well for cmos
pbase / nbase (optional) for bipolar
shallow trench isolation
sonos for flash (optional)
aiming higher voltages, higher speed and higher feasibilty for modern Analog and System-on-Chip design.
4203 links, including 278 private