Mitre Attack
Mitre Attack
FRAMEWORK
- Nirali N Malvaniya
[Enrollment no: 240043001049]
Content:
• What is a MITRE ATT&CK framework?
• Understanding MITRE ATT&CK framework
• History of MITRE ATT&CK framework
• Matrices of MITRE ATT&CK framework
• Key Components of MITRE ATT&CK framework
• Why is important?
WHAT IS MITRE ATT&CK
FRAMEWORK ?
ICS Matrix
ENTERPRISE MATRIX
• The Enterprise matrix, focuses on tactics and techniques that
adversaries use against Windows, macOS, and Linux systems. It
outlines a variety of tactics, from initial access and execution to
command and control and exfiltration, providing a granular view of
potential attack vectors within corporate networks. This matrix is
instrumental for organizations in identifying vulnerabilities, enhancing
detection capabilities, and fortifying their defenses against
sophisticated cyber threats.
MOBILE MATRIX
• This matrix addresses unique mobile-specific concerns, such as
exploiting operating system features or apps to gain unauthorized
access and information. It is an essential tool for understanding the
evolving tactics used in mobile environments, helping security teams
develop robust strategies for protecting sensitive data on mobile
devices.
ICS MATRIX
• The ICS matrix highlights cyber threats within industrial environments
where operational technology (OT) is prevalent. It highlights
adversaries' tactics and techniques to disrupt, control, or damage
industrial processes. This matrix is crucial for safeguarding critical
infrastructure, as it provides insights into the intersection of cyber and
physical security, enabling the implementation of effective
countermeasures against threats to industrial operations.
KEY
TACTICSCOMPONENTS
TECHNIQUES OF MITRE
ATT&CK FRAMEWORK
• The MITRE ATT&CK framework is a critical resource in cybersecurity. It
PROCEDURES
provides a comprehensive matrix of threat actors' tactics, techniques,
and procedures. Built on the security community's shared knowledge,
it helps organizations understand and mitigate rapidly evolving cyber
threats, enhancing their security posture.
TACTICS
• Tactics represent the “why” of an ATT&CK technique or sub technique. Each
tactic represents a specific goal an attacker aims to achieve, such as gaining
initial access to a system, executing malicious code, or exfiltrating data.
• https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack
#:~:text=It%20was%20established%20to%20provide,groups%20use%
20against%20enterprise%20businesses.