Critical Infrastructure Cybersecurity Framework
T1119Collection2 Mitigations

Automated Collection

Once established within a system or network, an adversary may use automated techniques for collecting internal data.

Description

Once established within a system or network, an adversary may use automated techniques for collecting internal data.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Encrypt Sensitive InformationRemote Data Storage

Quick Info

Technique ID
T1119
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.