Sponsor of the Day:
Jerkmate
https://d3fend.mitre.org/technique/d3f:FirmwareBehaviorAnalysis/
Firmware Behavior Analysis - Technique D3-FBA | MITRE D3FEND™
Analyzing the behavior of embedded code in firmware and looking for anomalous behavior and suspicious activity.
behavior analysistechnique d3firmwarefbamitre
https://d3fend.mitre.org/technique/d3f:URLAnalysis/
URL Analysis - Technique D3-UA | MITRE D3FEND™
Determining if a URL is benign or malicious by analyzing the URL or its components.
url analysistechnique d3uamitre
https://d3fend.mitre.org/technique/d3f:ProcessTermination/
Process Termination - Technique D3-PT | MITRE D3FEND™
Terminating a running application process on a computer system.
technique d3processterminationptmitre
https://d3fend.mitre.org/technique/d3f:NetworkTrafficPolicyMapping/
Network Traffic Policy Mapping - Technique D3-NTPM | MITRE D3FEND™
Network traffic policy mapping identifies and models the allowed pathways of data at the network, transport, and/or application levels.
network traffictechnique d3policymappingmitre
https://d3fend.mitre.org/technique/d3f:StrongPasswordPolicy/
Strong Password Policy - Technique D3-SPP | MITRE D3FEND™
Modifying system configuration to increase password strength.
strong passwordtechnique d3policysppmitre
https://d3fend.mitre.org/technique/d3f:Certificate-basedAuthentication/
Certificate-based Authentication - Technique D3-CBAN | MITRE D3FEND™
Requiring a digital certificate in order to authenticate a user.
certificate basedtechnique d3authenticationcbanmitre
https://d3fend.mitre.org/technique/d3f:SystemDependencyMapping/
System Dependency Mapping - Technique D3-SYSDM | MITRE D3FEND™
System dependency mapping identifies and models the dependencies of system components on each other to carry out their function.
dependency mappingtechnique d3systemmitre
https://d3fend.mitre.org/technique/d3f:OperatingModeMonitoring/
Operating Mode Monitoring - Technique D3-OMM | MITRE D3FEND™
Detects operating modes such as Program, Run, Remote, or Stop.
technique d3operatingmodemonitoringomm
https://d3fend.mitre.org/technique/d3f:TrustedLibrary/
Trusted Library - Technique D3-TL | MITRE D3FEND™
A trusted library is a collection of pre-verified and secure code modules or components that are used within software applications to perform specific...
technique d3trustedlibrarytlmitre
https://d3fend.mitre.org/technique/d3f:ProtocolMetadataAnomalyDetection/
Protocol Metadata Anomaly Detection - Technique D3-PMAD | MITRE D3FEND™
Collecting network communication protocol metadata and identifying statistical outliers.
anomaly detectiontechnique d3protocolmetadatapmad