Welcome to my older one. Listen to
matrices and platforms.
In this lesson, we will explore our matrices are used to visualize attack,
begin to understand the differences between various attack platforms
and identify the relationships between these different platforms
you may have already seen. This attack is typically visualized what we call the Matrix, which captures the relationships between tactics, techniques and sub techniques.
Attack is not one matrix, though rather a series or collection of matrices, each of which focuses on specific technology, domain
or ecosystem that the adversary is operating within.
This is a tax oldest and most popular matrix,
which captures the enterprise technology domain.
The enterprise technology domain is indicative of a traditional enterprise network and associated cloud technologies.
As we can see, this matrix is comprised of 14 tactics and various techniques that an adversary made reform
within each technology remain.
Attack also defines what we call platforms or specific systems that adversary may operate against.
In the case of enterprise, we can see their various platforms defined, which may be indicative of operating systems or specific applications such as Windows.
Mac OS Cloud or Network
Enterprise also includes the pre platform,
which captures behavior is performed by an adversary. Pre compromise,
such as those
under the Reconnaissance and Resource Development Tactics
Attack, also includes technology that means outside of enterprise,
such as mobile,
which is platforms for android and IOS,
and attack for industrial control systems, or six,
which includes behaviors performance against various operational technologies.
overlapping redundancies often exist between matrices,
this is based on the fact that adversaries perform very similar behaviors between different technology, domains and platforms.
Then we also perform actions that's banned various technologies,
and with that, we reach our knowledge. Check for listen to
Each attack matrix is completely distinct from other matrices,
please positive video and take a second to think of the correct answer before proceeding.
The answer is no. Logic was false
that are very often overlapping redundancies between matrices with an attack.
And with that, we have reached the end of the lesson. Two.
matrices capture the relationship between tactics, techniques and procedures within attack.
Each matrix focuses on specific technology remain.
It may also be filtered down to specific platform,
and finally, while attack matrixes are unique.
Very often there are relationships and overlap in many ways.