Exploration of Tactics, Techniques, and Procedures (TTP) in Cyber Attacks on Government Infrastructure
Abstract
Cybersecurity has become a crucial issue in protecting government infrastructure in the digital era. Cyberattacks are increasingly sophisticated and structured using a variety of evolving Tactics, Techniques, and Procedures (TTPs). This research aims to explore the patterns of cyberattacks targeting government systems and understand how TTPs are used by threat actors to penetrate, exploit, and disrupt critical infrastructure. The research method used is qualitative with a case study approach and in-depth interviews with cybersecurity experts, threat analysts, and relevant officials in the government sector. In addition, this research also reviewed documented cyber incident reports to identify frequent attack patterns. The results show that cyberattacks against government infrastructure are generally carried out through spear-phishing, exploitation of software vulnerabilities, and persistence techniques to maintain illegal access. In addition, threat actors often use lateral movement methods to spread attacks to wider systems. The study also found that most attacks capitalize on gaps in security policies and lack of employee awareness as key success factors. In conclusion, an in-depth understanding of the TTPs used in cyberattacks can help improve mitigation strategies, strengthen security policies, and develop early detection systems to protect government infrastructure from increasingly complex threats.
Keywords
cybersecurity, cyberattacks, technical tactics and procedures (TTP), government infrastructure, cyber threats
Full Text:
PDFDOI: http://dx.doi.org/10.52155/ijpsat.v49.1.7014
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Firman Faidin, Danang Rimbawa, J.W Saputro

This work is licensed under a Creative Commons Attribution 4.0 International License.