Critical Infrastructure Cybersecurity Framework
T1125Collection1 Mitigations

Video Capture

An adversary can leverage a computer's peripheral devices or applications to capture video recordings.

Description

An adversary can leverage a computer's peripheral devices or applications to capture video recordings.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Operating System Configuration

Quick Info

Technique ID
T1125
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.