Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
4 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Archive Collected Data | Collection | An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing t… | Edit | |
| Archive Collected Data: Archive via Custom Method | Collection | An adversary may compress or encrypt data that is collected prior to exfiltration using a custom met… | Edit | |
| Archive Collected Data: Archive via Library | Collection | An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party li… | Edit | |
| Archive Collected Data: Archive via Utility | Collection | Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many … | Edit |