DiamondModel (@diamondmodel3) 's Twitter Profile
DiamondModel

@diamondmodel3

All models are wrong, but some are useful.

ID: 1104385407637086208

calendar_today09-03-2019 14:16:14

7 Tweet

55 Followers

7 Following

DiamondModel (@diamondmodel3) 's Twitter Profile Photo

"There exists a set of adversaries (insiders, outsiders, individuals, groups, and organizations) which seek to compromise computer systems or networks to further their intent and satisfy their needs."

DiamondModel (@diamondmodel3) 's Twitter Profile Photo

The infrastructure feature describes the physical and/or logical communication structures the adversary uses to deliver a capability, maintain control of capabilities (e.g., command- and-control/C2), and effect results from the victim (e.g., exfiltrate data).