Consequences Library
Reusable consequence definitions (effects on the right side of bow-tie diagrams).
Add Consequence
Tags:
clear tags
5 consequences — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Resource Hijacking | Impact | Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, whi… | Edit | |
| Resource Hijacking: Bandwidth Hijacking | Impact | Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-in… | Edit | |
| Resource Hijacking: Cloud Service Hijacking | Impact | Adversaries may leverage compromised software-as-a-service (SaaS) applications to complete resource-… | Edit | |
| Resource Hijacking: Compute Hijacking | Impact | Adversaries may leverage the compute resources of co-opted systems to complete resource-intensive ta… | Edit | |
| Resource Hijacking: SMS Pumping | Impact | Adversaries may leverage messaging services for SMS pumping, which may impact system and/or hosted s… | Edit |