Matrices/Platforms

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome to my older one. Listen to
00:02
matrices and platforms.
00:06
In this lesson, we will explore our matrices are used to visualize attack,
00:11
begin to understand the differences between various attack platforms
00:15
and identify the relationships between these different platforms
00:22
you may have already seen. This attack is typically visualized what we call the Matrix, which captures the relationships between tactics, techniques and sub techniques.
00:32
Attack is not one matrix, though rather a series or collection of matrices, each of which focuses on specific technology, domain
00:39
or ecosystem that the adversary is operating within.
00:45
This is a tax oldest and most popular matrix,
00:48
which captures the enterprise technology domain.
00:52
The enterprise technology domain is indicative of a traditional enterprise network and associated cloud technologies.
01:00
As we can see, this matrix is comprised of 14 tactics and various techniques that an adversary made reform
01:07
within each technology remain.
01:10
Attack also defines what we call platforms or specific systems that adversary may operate against.
01:15
In the case of enterprise, we can see their various platforms defined, which may be indicative of operating systems or specific applications such as Windows.
01:25
Lennox,
01:26
Mac OS Cloud or Network
01:32
Enterprise also includes the pre platform,
01:34
which captures behavior is performed by an adversary. Pre compromise,
01:38
such as those
01:38
under the Reconnaissance and Resource Development Tactics
01:47
Attack, also includes technology that means outside of enterprise,
01:49
such as mobile,
01:51
which is platforms for android and IOS,
01:56
and attack for industrial control systems, or six,
01:59
which includes behaviors performance against various operational technologies.
02:07
Although distinct,
02:09
overlapping redundancies often exist between matrices,
02:14
this is based on the fact that adversaries perform very similar behaviors between different technology, domains and platforms.
02:21
Then we also perform actions that's banned various technologies,
02:29
and with that, we reach our knowledge. Check for listen to
02:32
sure falls.
02:34
Each attack matrix is completely distinct from other matrices,
02:38
please positive video and take a second to think of the correct answer before proceeding.
02:47
The answer is no. Logic was false
02:51
that are very often overlapping redundancies between matrices with an attack.
02:59
And with that, we have reached the end of the lesson. Two.
03:01
In summary
03:02
matrices capture the relationship between tactics, techniques and procedures within attack.
03:09
Each matrix focuses on specific technology remain.
03:13
It may also be filtered down to specific platform,
03:17
and finally, while attack matrixes are unique.
03:21
Very often there are relationships and overlap in many ways.
Up Next