Loss of Availability

From attackics
Jump to navigation Jump to search
Loss of Availability
ID T826
Tactic Impact


Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services.123

Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases.

Procedure Examples

  • A Conficker infection at a nuclear power plant forced the facility to temporarily shutdown.4