TA0009
Collection
The adversary is trying to gather data of interest to their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from.
Critical Infrastructure Cybersecurity
The adversary is trying to gather data of interest to their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from.
By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.