Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
4 threats — page 1 of 1
Name Category Tags Description
Supply Chain Compromise Initial Access Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consu… Edit
Supply Chain Compromise: Compromise Hardware Supply Chain Initial Access Adversaries may manipulate hardware components in products prior to receipt by a final consumer for … Edit
Supply Chain Compromise: Compromise Software Dependencies and Development Tools Initial Access Adversaries may manipulate software dependencies and development tools prior to receipt by a final c… Edit
Supply Chain Compromise: Compromise Software Supply Chain Initial Access Adversaries may manipulate application software prior to receipt by a final consumer for the purpose… Edit