Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
6 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| User Execution | Execution | An adversary may rely upon specific actions by a user in order to gain execution. Users may be subje… | Edit | |
| User Execution: Malicious Copy and Paste | Execution | An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be … | Edit | |
| User Execution: Malicious File | Execution | An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be … | Edit | |
| User Execution: Malicious Image | Execution | Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Service… | Edit | |
| User Execution: Malicious Library | Execution | Adversaries may rely on a user installing a malicious library to facilitate execution. Threat actors… | Edit | |
| User Execution: Malicious Link | Execution | An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be… | Edit |