Consequences Library

Reusable consequence definitions (effects on the right side of bow-tie diagrams).

Add Consequence

Tags: clear tags
Clear all
5 consequences — page 1 of 1
Name Category Tags Description
Resource Hijacking Impact Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, whi… Edit
Resource Hijacking: Bandwidth Hijacking Impact Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-in… Edit
Resource Hijacking: Cloud Service Hijacking Impact Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-… Edit
Resource Hijacking: Compute Hijacking Impact Adversaries may leverage the compute resources of co-opted systems to complete resource-intensive ta… Edit
Resource Hijacking: SMS Pumping Impact Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted s… Edit