Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
3 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Encrypted Channel | Command And Control | Adversaries may employ an encryption algorithm to conceal command and control traffic rather than re… | Edit | |
| Encrypted Channel: Asymmetric Cryptography | Command And Control | Adversaries may employ a known asymmetric encryption algorithm to conceal command and control traffi… | Edit | |
| Encrypted Channel: Symmetric Cryptography | Command And Control | Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic… | Edit |