Mansoor Ahmad Khanโ€™s Post

View profile for Mansoor Ahmad Khan

IT / OT / ICS Cybersecurity | GICSP | ISA/IEC-62443 CFS / CDS | CISSP | CISM

๐Ÿญ ๐Ÿญ ๐Ÿ›ก ๐Ÿ›ก ๐™ˆ๐™„๐™๐™๐™€ ๐˜ผ๐™๐™&๐˜พ๐™† ๐™›๐™ค๐™ง ๐™„๐˜พ๐™Ž | ๐™‹๐™–๐™ง๐™ฉ 1๏ธโƒฃ ๐™ค๐™› 1๏ธโƒฃ4๏ธโƒฃ ๐Ÿ›ก ๐Ÿ›ก ๐Ÿญ ๐Ÿญ I have decided to start this series of posts on the topic of ๐— ๐—œ๐—ง๐—ฅ๐—˜ ๐—”๐—ง๐—ง&๐—–๐—ž ๐—ณ๐—ผ๐—ฟ ๐—œ๐—–๐—ฆ which is an effort to present ICS adversary tactics and techniques in simple words and with real world examples. But first we need to understand ๐˜„๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐— ๐—œ๐—ง๐—ฅ๐—˜ ๐—ฎ๐—ป๐—ฑ ๐˜„๐—ต๐˜† ๐˜๐—ต๐—ฒ๐—ฟ๐—ฒ ๐—ถ๐˜€ ๐—ฎ๐—ป & ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—”๐—ง๐—ง&๐—–๐—ž !!! ๐— ๐—œ๐—ง๐—ฅ๐—˜ Corporation is an American not-for-profit organization. It is not an acronym; it is a name to represent the substantial cybersecurity knowledge base funded by NIST. Basically it is a knowledge base of adversary tactics and techniques based on real-world observations of cybersecurity threats. ๐— ๐—œ๐—ง๐—ฅ๐—˜ has released a framework by the name of ๐—”๐—ง๐—ง&๐—–๐—ž which stands for Adversary Tactics, Techniques and Common Knowledge. It provides an overview on how vendor technologies can assist in defending against cyber attacks. There is an ATT&CK framework for: 1๏ธโƒฃ Mobile ๐Ÿ“ฑ 2๏ธโƒฃ Enterprise ๐Ÿข 3๏ธโƒฃ ICS or OT ๐Ÿญ We will focus on ๐— ๐—œ๐—ง๐—ฅ๐—˜ ๐—”๐—ง๐—ง&๐—–๐—ž ๐—ณ๐—ผ๐—ฟ ๐—œ๐—–๐—ฆ in this series Stay tuned for ๐™‹๐™–๐™ง๐™ฉ 2๏ธโƒฃ #cybersecurity #cyberdefense #networksecurity #ics #icssecurity #otsecurity #industrialcybersecurity #industrialsecurity #operationaltechnology #mitre #mitreattack #framework #nist

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics