Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
9 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Acquire Infrastructure | Resource Development | Adversaries may buy, lease, rent, or obtain infrastructure that can be used during targeting. A wide… | Edit | |
| Acquire Infrastructure: Botnet | Resource Development | Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeti… | Edit | |
| Acquire Infrastructure: DNS Server | Resource Development | Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting.… | Edit | |
| Acquire Infrastructure: Domains | Resource Development | Adversaries may acquire domains that can be used during targeting. Domain names are the human readab… | Edit | |
| Acquire Infrastructure: Malvertising | Resource Development | Adversaries may purchase online advertisements that can be abused to distribute malware to victims. … | Edit | |
| Acquire Infrastructure: Server | Resource Development | Adversaries may buy, lease, rent, or obtain physical servers that can be used during targeting. Use … | Edit | |
| Acquire Infrastructure: Serverless | Resource Development | Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers, … | Edit | |
| Acquire Infrastructure: Virtual Private Server | Resource Development | Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. There exist a… | Edit | |
| Acquire Infrastructure: Web Services | Resource Development | Adversaries may register for web services that can be used during targeting. A variety of popular we… | Edit |