Hardware Additions
Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network.
Description
Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Limit Hardware Installation
Quick Info
- Technique ID
- T1200
- Tactic
- Initial Access
- Mitigations
- 1
