What is Collection?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

8 hours 28 minutes
Video Transcription
hello and welcome to another application of the minor attack framework discussion. Today we're going to get into our next phase of the matter attack framework, and we're going to talk about collection. So to get a started, what is collection? So collection is
the threat. Actor is essentially collecting data of interest that meets their goals. So they have an objective in mind
and they're trying to meet that. And this will eventually or typically lead to some form of ex filtration as well as impact, which will be the ones that will be getting into a swell
now. Some common information of interest could include things like browser data, audio data, video data, email information, primarily looking for things that could either help them to get some type of financial gain or to get some type of information that would be to their benefit.
Now we're going to just be looking at a few sections within collection, and so we will focus on looking at audio capture, clipboard data and data from the local systems as far as the vector within the collection portion of the phase of the the minor attack framework. So with that in mind, I want to thank you for your time today,
and I look forward to seeing you again.
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By