{"title":"ttp的顶部:恶意软件最常见的战术、技术和程序","authors":"Suleyman Ozarslan","doi":"10.12968/s1353-4858(23)70042-1","DOIUrl":null,"url":null,"abstract":"The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Top of the TTPs: Malware's most common tactics, techniques and procedures\",\"authors\":\"Suleyman Ozarslan\",\"doi\":\"10.12968/s1353-4858(23)70042-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(23)70042-1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70042-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Top of the TTPs: Malware's most common tactics, techniques and procedures
The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.