Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
4 threats — page 1 of 1
Name Category Tags Description
Archive Collected Data Collection An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing t… Edit
Archive Collected Data: Archive via Custom Method Collection An adversary may compress or encrypt data that is collected prior to exfiltration using a custom met… Edit
Archive Collected Data: Archive via Library Collection An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party li… Edit
Archive Collected Data: Archive via Utility Collection Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many … Edit