Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
2 threats — page 1 of 1
Name Category Tags Description
Network Boundary Bridging Defense Evasion Adversaries may bridge network boundaries by compromising perimeter network devices or internal devi… Edit
Network Boundary Bridging: Network Address Translation Traversal Defense Evasion Adversaries may bridge network boundaries by modifying a network device’s Network Address Translatio… Edit