Property:Has Summary

From attackics
Jump to navigation Jump to search

This is a property of type Text.

Showing 12 pages using this property.
C
The adversary is trying to gather data of interest and domain knowledge on your ICS environment to inform their goal.  +
The adversary is trying to communicate with and control compromised systems, controllers, and platforms with access to your ICS environment.  +
D
The adversary is locating information to assess and identify their targets in your environment.  +
E
The adversary is trying to avoid security defenses.  +
The adversary is trying to run code or manipulate system functions, parameters, and data in an unauthorized way.  +
I
The adversary is trying to manipulate, interrupt, or destroy your ICS systems, data, and their surrounding environment.  +
The adversary is trying to manipulate, disable, or damage physical control processes.  +
The adversary is trying to prevent your safety, protection, quality assurance, and operator intervention functions from responding to a failure, hazard, or unsafe state.  +
The adversary is trying to get into your ICS environment.  +
L
The adversary is trying to move through your ICS environment.  +
P
The adversary is trying to maintain their foothold in your ICS environment.  +
The adversary is trying to gain higher-level permissions.  +