Cybersecurity threat categories

Network Threats

Host Threats

Application Threats

Cyber killchain methodology

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. C&C
  7. Actions on objectives

TTPs

Tacticas

Es el patron que el adversario utilizo para comprometer el equipo.

Tecnicas