Identify technology usage patterns

Technology usage patterns include identifying if users work offsite, connect remotely, or other possibly less restricted/secured access techniques. [1]

ID: T1264

Tactic: Technical Information Gathering

Version: 1.0

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Physical observations, OSINT for remote access instructions, and other techniques are not detectable.

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Determine if users work offsite, connect remotely, or other possibly less restricted/secured access techniques.

References

  1. Jason Ragland. (2010, January 18). Remotely Accessing Sensitive Resources. Retrieved March 5, 2017.