Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
4 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Supply Chain Compromise | Initial Access | Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consu… | Edit | |
| Supply Chain Compromise: Compromise Hardware Supply Chain | Initial Access | Adversaries may manipulate hardware components in products prior to receipt by a final consumer for … | Edit | |
| Supply Chain Compromise: Compromise Software Dependencies and Development Tools | Initial Access | Adversaries may manipulate software dependencies and development tools prior to receipt by a final c… | Edit | |
| Supply Chain Compromise: Compromise Software Supply Chain | Initial Access | Adversaries may manipulate application software prior to receipt by a final consumer for the purpose… | Edit |