DiamondModel3's profile picture. All models are wrong, but some are useful.

DiamondModel

@DiamondModel3

All models are wrong, but some are useful.

Remember: diamonds are forever


Felt cute, may delete later

DiamondModel3's tweet image. Felt cute, may delete later

The infrastructure feature describes the physical and/or logical communication structures the adversary uses to deliver a capability, maintain control of capabilities (e.g., command- and-control/C2), and effect results from the victim (e.g., exfiltrate data).


"There exists a set of adversaries (insiders, outsiders, individuals, groups, and organizations) which seek to compromise computer systems or networks to further their intent and satisfy their needs."


United States Trends

Loading...

Something went wrong.


Something went wrong.