Tactics
Tactics represent the 'why' of a technique or countermeasure. It is the threat actor's (Eve's) or defender's tactical goal and the reason they are performing a technique or countermeasure.
Tactics: 7
QID | Title | Description | Type |
---|---|---|---|
T-0021 | Model |
The model tactic is used to apply security engineering, vulnerability, threat, and risk analyses to the systems. |
Defence |
T-0015 | Harden |
The harden tactic is used to increase the opportunity cost of a system exploitation. Hardening differs from Detection in that it generally is conducted before a system is online and operational. |
Defence |
T-0016 | Detect |
The detect tactic is used to identify adversary access to or unauthorized activity on a system. |
Defence |
T-0017 | Isolate |
The isolate tactic creates logical or physical barriers in a system which reduces opportunities for adversaries to create further accesses. |
Defence |
T-0018 | Deceive |
The deceive tactic is used to advertise, entice, and allow potential attackers access to an observed or controlled environment. |
Defence |
T-0019 | Evict |
The eviction tactic is used to remove an adversary from a system. |
Defence |
T-0020 | Restore |
The restore tactic is used to return the system to a better state. |
Defence |