Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has Summary" with value "The adversary is trying to avoid security defenses.". Since there have been only a few results, also nearby values are displayed.

Showing below up to 11 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Evasion  + (The adversary is trying to avoid security defenses.)
    • Command and Control  + (The adversary is trying to communicate with and control compromised systems, controllers, and platforms with access to your ICS environment.)
    • Privilege Escalation  + (The adversary is trying to gain higher-level permissions.)
    • Collection  + (The adversary is trying to gather data of interest and domain knowledge on your ICS environment to inform their goal.)
    • Initial Access  + (The adversary is trying to get into your ICS environment.)
    • Persistence  + (The adversary is trying to maintain their foothold in your ICS environment.)
    • Impair Process Control  + (The adversary is trying to manipulate, disable, or damage physical control processes.)
    • Impact  + (The adversary is trying to manipulate, interrupt, or destroy your ICS systems, data, and their surrounding environment.)
    • Lateral Movement  + (The adversary is trying to move through your ICS environment.)
    • Inhibit Response Function  + (The adversary is trying to prevent your safety, protection, quality assurance, and operator intervention functions from responding to a failure, hazard, or unsafe state.)
    • Execution  + (The adversary is trying to run code or manipulate system functions, parameters, and data in an unauthorized way.)