Loss of Availability

From attackics
Revision as of 17:22, 4 November 2019 by (username removed)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Loss of Availability
Technique
ID T826
Tactic Impact

Description

Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services.123

Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases.


Procedure Examples

  • A Conficker infection at a nuclear power plant forced the facility to temporarily shutdown.4