ATT&CK-CN V1.01 Last Update: 2019-11 [返回索引页]

译者: 林妙倩(清华大学网络研究院网络空间安全实习生)、戴亦仑(赛宁网安) 原创翻译作品,如果需要转载请取得翻译作者同意。

数据来源:ATT&CK Matrices

原文: https://attack.mitre.org/tactics/TA0040/

术语表: /attack/glossary

影响

对手试图操纵,中断或破坏您的系统和数据。

影响包括攻击者用来通过操纵业务和运营流程来破坏可用性或损害完整性的技术。用于影响的技术可以包括破坏或篡改数据。在某些情况下,业务流程可能看起来不错,但可能已进行了更改以使对手的目标受益。攻击者可能会使用这些技术来实现其最终目标,或为违反保密性提供掩护。

Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data.

Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.