Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
5 threats — page 1 of 1
Name Category Tags Description
Develop Capabilities Resource Development Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely… Edit
Develop Capabilities: Code Signing Certificates Resource Development Adversaries may create self-signed code signing certificates that can be used during targeting. Code… Edit
Develop Capabilities: Digital Certificates Resource Development Adversaries may create self-signed SSL/TLS certificates that can be used during targeting. SSL/TLS c… Edit
Develop Capabilities: Exploits Resource Development Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a … Edit
Develop Capabilities: Malware Resource Development Adversaries may develop malware and malware components that can be used during targeting. Building m… Edit