Data Manipulation
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity.
Description
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Encrypt Sensitive InformationRestrict File and Directory Permissions
Quick Info
- Technique ID
- T1565
- Tactic
- Impact
- Sub-Techniques
- 3
- Mitigations
- 2
