Not all attackers are trying to exfiltrate data. In security, we’re all familiar with CIA triad—confidentiality, availability, and integrity. While Exfiltration describes adversarial behavior with the goal of violating confidentiality, attackers may look to manipulate, interrupt, or destroy your systems and data. The Impact tactic describes techniques that adversaries use to compromise the availability or […]… Read More
The post The MITRE ATT&CK Framework: Impact appeared first on The State of Security.
from The State of Security https://ift.tt/2PnPx1R
via https://ifttt.com/ IFTTT
No comments:
Post a Comment