Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications.
Domain | ID | Name | Use | |
---|---|---|---|---|
ICS | T0839 | Module Firmware |
The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware. |
|
ICS | T0842 | Network Sniffing |
Ensure that wired and/or wireless traffic is encrypted when feasible. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS. [1] |
|
ICS | T0857 | System Firmware |
The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware. |
|
ICS | T0860 | Wireless Compromise |
Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications. |
|
ICS | T0887 | Wireless Sniffing |
Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications. [2] |