![]() Procedures are technical details or directions about how a threat actor will leverage the technique to accomplish their objective. ![]() For example, a technique to gain initial access could be phishing. Techniques are detailed descriptions about the behavior or actions that lead up to the tactic. For example, initial access is a tactic a threat actor would leverage to gain a foothold in your network. In cybersecurity, tactics refer to high level descriptions of behaviors threat actors are trying to accomplish. Tactics, Techniques and Procedures (TTPs), an essential concept in cybersecurity, describes the behavior of a threat actor or group. They are combining different tactics and multiple techniques to achieve their objectives. Threat actors rarely use single vector attacks anymore. The cybersecurity threat landscape continues to grow as the attacks and evasion maneuvers of threat actors makes the task of detecting and tracking cyberattacks increasingly challenging. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |