ATTACK things are concepts defined in the ATT&CK Framework.
Information about what access ...... r users for particular objects
In computer systems, an access ...... secret just like a password).
Administrative network traffic ...... y only used by administrators.
A program that gives a compute ...... files, shared libraries, etc.
Information used to configure the parameters and initial settings for an application.
A database used to hold application configuration data.
A database record holding info ...... l settings for an application.
A file containing Information ...... or macOS. Usually text-based.
An application firewall is a f ...... t-based application firewalls.
An application process is an i ...... rogram that is being executed.
A configuration of an applicat ...... processed by the application.
An archive file is a file that ...... times use built-in encryption.
A man-made object taken as a whole.
A digital artifact server prov ...... pendent access to the content.
The classification of someone or something with respect to its worth.
Asymmetric keys are public and ...... ed private key can decrypt it.
Audio input devices allow a us ...... h speech recognition software.
A request-response comprising ...... m and a verification response.
A log of authentication events.
An authentication service is a ...... ty of either (e.g., Kerberos).
Authorization is the function ...... mputer users, computer program
An authorization service ensur ...... t-based access control (LBAC).
A binary large object (BLOB) i ...... able code is stored as a blob.
A binary segment is a partitio ...... re also found in object files.
A block device (or block speci ...... of the device are not visible.
A bootloader is software that ...... d data can be loaded into RAM.
A d3f:Record which is an essen ...... ystem initialization) process.
A boot record [boot sector] is ...... , the BIOS, Das U-Boot, etc.).
A web browser (commonly referr ...... orks or files in file systems.
A browser extension is a plug- ...... xample, by adding a "toolbar."
A tool that automates the proc ...... , and running automated tests.
A distinguishing characteristi ...... ortability, or functionality).
In cryptography, a public key ...... a computer or other device, t
A file containing a digital ce ...... to communicate with its owner.
A certificate truststore is us ...... server for an SSL connection.
A client application is softwa ...... lay in the client-server model
A client computer is a host th ...... e service by way of a network.
The clipboard is a buffer that ...... clipboard for further pasting.
Information used to configure ...... e running in a cloud service..
Cloud instance metadata is con ...... ariables, passwords, and more.
A request-response comprising ...... ying party is a cloud service.
Cloud authorization is the function of specifying access rights to cloud resources.
Cloud storage is storage held within a computing cloud.
A user account on a given host ...... d resources within that cloud.
Code analyzers automatically a ...... ) or in a combination of both.
A code repository is a form of ...... maintained on a single server.
Collaborative software or grou ...... by means of computer systems."
In computing, a command is a d ...... selecting an option in a menu.
A log of commands run in an operating system shell.