Identify technology usage patterns
|Identify technology usage patterns|
|Tactic||Technical Information Gathering|
Technology usage patterns include identifying if users work offsite, connect remotely, or other possibly less restricted/secured access techniques.1
Difficulty for the Adversary
Easy for the Adversary (Yes/No): Yes
Explanation: Determine if users work offsite, connect remotely, or other possibly less restricted/secured access techniques.
Detectable by Common Defenses (Yes/No/Partial): No
Explanation: Physical observations, OSINT for remote access instructions, and other techniques are not detectable.