Critical Infrastructure Cybersecurity Framework
T1565Impact2 Mitigations

Data Manipulation

Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity.

Description

Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Encrypt Sensitive InformationRestrict File and Directory Permissions

Quick Info

Technique ID
T1565
Tactic
Impact
Sub-Techniques
3
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.