Critical Infrastructure Cybersecurity Framework

Modify Authentication Process

Adversaries may modify authentication mechanisms to access user credentials or enable otherwise unwarranted access.

Description

Adversaries may modify authentication mechanisms to access user credentials or enable otherwise unwarranted access.

Quick Info

Technique ID
T1556
Sub-Techniques
9
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.