Skip to main content
ATT&CK - MITRE Adversarial Tactics, Techniques & Common Knowledge

ATT&CK

CYBERSECURITY DICTIONARY

ATT&CK - MITRE Adversarial Tactics, Techniques & Common Knowledge

MITRE’s National Cybersecurity Federally Funded Research and Development Centers (FFRDC’s) Adversarial Tactic, Techniques, and Common Knowledge (ATT&CK) repository of collected cybersecurity data.

ATT&CK bridges the gap between multiple offensive security data points, including Tactics, Techniques, Tools, and identified malicious Advanced Persistent Threat actors. The creation of most of this framework comes from an interesting project executed by Blake Storm, of MITRE, called project FMX (Fort Meade Experiment). In this project, a production network was attacked by Blake and other security professionals which impersonated adversarial groups' tactics and techniques. By leveraging data points collected on the network, Blake was able to construct a large part of the ATT&CK framework that could be leveraged by offensive as well as defensive security professionals, to map potential offensive tactics and techniques.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

RELATED ASSETS

September 28, 2018

Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series)

This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of...

See Details

October 05, 2018

ATT&CK’s Initial Access Adversarial Tactic

By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations ...

See Details

November 06, 2018

ATT&CK Series: Process Injection, Bypass User Account Control, Exploitation for Privilege Escalation

By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.