Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
4 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Search Open Websites/Domains | Reconnaissance | Adversaries may search freely available websites and/or domains for information about victims that c… | Edit | |
| Search Open Websites/Domains: Code Repositories | Reconnaissance | Adversaries may search public code repositories for information about victims that can be used durin… | Edit | |
| Search Open Websites/Domains: Search Engines | Reconnaissance | Adversaries may use search engines to collect information about victims that can be used during targ… | Edit | |
| Search Open Websites/Domains: Social Media | Reconnaissance | Adversaries may search social media for information about victims that can be used during targeting.… | Edit |