Defensive TechniqueApplication HardeningCredential EvictionCredential HardeningDecoy EnvironmentDecoy ObjectExecution IsolationFile AnalysisIdentifier AnalysisMessage AnalysisMessage HardeningNetwork IsolationNetwork Traffic AnalysisPlatform HardeningPlatform MonitoringProcess AnalysisProcess EvictionUser Behavior Analysis
subClassOf
definition
A method which makes a computer system more difficult to attack.
enables
synonym
Countermeasure Technique
Defensive Capability Feature
Technical Security Control
label
Defensive Technique