Robuta

Sponsor of the Day: Jerkmate
https://d3fend.mitre.org/technique/d3f:FirmwareBehaviorAnalysis/ Firmware Behavior Analysis - Technique D3-FBA | MITRE D3FEND™ Analyzing the behavior of embedded code in firmware and looking for anomalous behavior and suspicious activity. behavior analysistechnique d3firmwarefbamitre https://d3fend.mitre.org/technique/d3f:URLAnalysis/ URL Analysis - Technique D3-UA | MITRE D3FEND™ Determining if a URL is benign or malicious by analyzing the URL or its components. url analysistechnique d3uamitre https://d3fend.mitre.org/technique/d3f:ProcessTermination/ Process Termination - Technique D3-PT | MITRE D3FEND™ Terminating a running application process on a computer system. technique d3processterminationptmitre https://d3fend.mitre.org/technique/d3f:NetworkTrafficPolicyMapping/ Network Traffic Policy Mapping - Technique D3-NTPM | MITRE D3FEND™ Network traffic policy mapping identifies and models the allowed pathways of data at the network, transport, and/or application levels. network traffictechnique d3policymappingmitre https://d3fend.mitre.org/technique/d3f:StrongPasswordPolicy/ Strong Password Policy - Technique D3-SPP | MITRE D3FEND™ Modifying system configuration to increase password strength. strong passwordtechnique d3policysppmitre https://d3fend.mitre.org/technique/d3f:Certificate-basedAuthentication/ Certificate-based Authentication - Technique D3-CBAN | MITRE D3FEND™ Requiring a digital certificate in order to authenticate a user. certificate basedtechnique d3authenticationcbanmitre https://d3fend.mitre.org/technique/d3f:SystemDependencyMapping/ System Dependency Mapping - Technique D3-SYSDM | MITRE D3FEND™ System dependency mapping identifies and models the dependencies of system components on each other to carry out their function. dependency mappingtechnique d3systemmitre https://d3fend.mitre.org/technique/d3f:OperatingModeMonitoring/ Operating Mode Monitoring - Technique D3-OMM | MITRE D3FEND™ Detects operating modes such as Program, Run, Remote, or Stop. technique d3operatingmodemonitoringomm https://d3fend.mitre.org/technique/d3f:TrustedLibrary/ Trusted Library - Technique D3-TL | MITRE D3FEND™ A trusted library is a collection of pre-verified and secure code modules or components that are used within software applications to perform specific... technique d3trustedlibrarytlmitre https://d3fend.mitre.org/technique/d3f:ProtocolMetadataAnomalyDetection/ Protocol Metadata Anomaly Detection - Technique D3-PMAD | MITRE D3FEND™ Collecting network communication protocol metadata and identifying statistical outliers. anomaly detectiontechnique d3protocolmetadatapmad