Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
4 threats — page 1 of 1
Name Category Tags Description
Data Obfuscation Command And Control Adversaries may obfuscate command and control traffic to make it more difficult to detect. Command a… Edit
Data Obfuscation: Junk Data Command And Control Adversaries may add junk data to protocols used for command and control to make detection more diffi… Edit
Data Obfuscation: Protocol or Service Impersonation Command And Control Adversaries may impersonate legitimate protocols or web service traffic to disguise command and cont… Edit
Data Obfuscation: Steganography Command And Control Adversaries may use steganographic techniques to hide command and control traffic to make detection … Edit