Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
4 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Gather Victim Identity Information | Reconnaissance | Adversaries may gather information about the victim's identity that can be used during targeting. In… | Edit | |
| Gather Victim Identity Information: Credentials | Reconnaissance | Adversaries may gather credentials that can be used during targeting. Account credentials gathered b… | Edit | |
| Gather Victim Identity Information: Email Addresses | Reconnaissance | Adversaries may gather email addresses that can be used during targeting. Even if internal instances… | Edit | |
| Gather Victim Identity Information: Employee Names | Reconnaissance | Adversaries may gather employee names that can be used during targeting. Employee names be used to d… | Edit |