Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
6 threats — page 1 of 1
Name Category Tags Description
User Execution Execution An adversary may rely upon specific actions by a user in order to gain execution. Users may be subje… Edit
User Execution: Malicious Copy and Paste Execution An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be … Edit
User Execution: Malicious File Execution An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be … Edit
User Execution: Malicious Image Execution Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Service… Edit
User Execution: Malicious Library Execution Adversaries may rely on a user installing a malicious library to facilitate execution. Threat actors… Edit
User Execution: Malicious Link Execution An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be… Edit