Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
7 threats — page 1 of 1
Name Category Tags Description
Data from Information Repositories Collection Adversaries may leverage information repositories to mine valuable information. Information reposito… Edit
Data from Information Repositories: Code Repositories Collection Adversaries may leverage code repositories to collect valuable information. Code repositories are to… Edit
Data from Information Repositories: Confluence Collection Adversaries may leverage Confluence repositories to mine valuable information. Often found in develo… Edit
Data from Information Repositories: Customer Relationship Management Software Collection Adversaries may leverage Customer Relationship Management (CRM) software to mine valuable informatio… Edit
Data from Information Repositories: Databases Collection Adversaries may leverage databases to mine valuable information. These databases may be hosted on-pr… Edit
Data from Information Repositories: Messaging Applications Collection Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and … Edit
Data from Information Repositories: Sharepoint Collection Adversaries may leverage the SharePoint repository as a source to mine valuable information. SharePo… Edit