This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Property:Has Summary
Jump to navigation
Jump to search
This is a property of type Text.
C
The adversary is trying to gather data of interest and domain knowledge on your ICS environment to inform their goal. +
The adversary is trying to communicate with and control compromised systems, controllers, and platforms with access to your ICS environment. +
D
The adversary is locating information to assess and identify their targets in your environment. +
E
The adversary is trying to run code or manipulate system functions, parameters, and data in an unauthorized way. +
I
The adversary is trying to manipulate, interrupt, or destroy your ICS systems, data, and their surrounding environment. +
The adversary is trying to manipulate, disable, or damage physical control processes. +
The adversary is trying to prevent your safety, protection, quality assurance, and operator intervention functions from responding to a failure, hazard, or unsafe state. +
The adversary is trying to get into your ICS environment. +
L
The adversary is trying to move through your ICS environment. +
P
The adversary is trying to maintain their foothold in your ICS environment. +
The adversary is trying to gain higher-level permissions. +