CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1025Collection1 Mitigations

Data from Removable Media

Adversaries may search connected removable media on computers they have compromised to find files of interest.

Description

Adversaries may search connected removable media on computers they have compromised to find files of interest.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Data Loss Prevention

Quick Info

Technique ID
T1025
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.