Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
7 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Data from Information Repositories | Collection | Adversaries may leverage information repositories to mine valuable information. Information reposito… | Edit | |
| Data from Information Repositories: Code Repositories | Collection | Adversaries may leverage code repositories to collect valuable information. Code repositories are to… | Edit | |
| Data from Information Repositories: Confluence | Collection | Adversaries may leverage Confluence repositories to mine valuable information. Often found in develo… | Edit | |
| Data from Information Repositories: Customer Relationship Management Software | Collection | Adversaries may leverage Customer Relationship Management (CRM) software to mine valuable informatio… | Edit | |
| Data from Information Repositories: Databases | Collection | Adversaries may leverage databases to mine valuable information. These databases may be hosted on-pr… | Edit | |
| Data from Information Repositories: Messaging Applications | Collection | Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and … | Edit | |
| Data from Information Repositories: Sharepoint | Collection | Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePo… | Edit |