Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
4 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Data Obfuscation | Command And Control | Adversaries may obfuscate command and control traffic to make it more difficult to detect. Command a… | Edit | |
| Data Obfuscation: Junk Data | Command And Control | Adversaries may add junk data to protocols used for command and control to make detection more diffi… | Edit | |
| Data Obfuscation: Protocol or Service Impersonation | Command And Control | Adversaries may impersonate legitimate protocols or web service traffic to disguise command and cont… | Edit | |
| Data Obfuscation: Steganography | Command And Control | Adversaries may use steganographic techniques to hide command and control traffic to make detection … | Edit |