all InfoSec news
An investigation of security controls and MITRE ATT\&CK techniques. (arXiv:2211.06500v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Attackers utilize a plethora of adversarial techniques in cyberattacks to
compromise the confidentiality, integrity, and availability of the target
organizations and systems. Information security standards such as NIST, ISO/IEC
specify hundreds of security controls that organizations can enforce to protect
and defend the information systems from adversarial techniques. However,
implementing all the available controls at the same time can be infeasible and
security controls need to be investigated in terms of their mitigation ability
over adversarial techniques used in cyberattacks …
att controls investigation mitre security security controls techniques