Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
3 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Weaken Encryption | Defense Evasion | Adversaries may compromise a network device’s encryption capability in order to bypass encryption th… | Edit | |
| Weaken Encryption: Disable Crypto Hardware | Defense Evasion | Adversaries disable a network device’s dedicated hardware encryption, which may enable them to lever… | Edit | |
| Weaken Encryption: Reduce Key Space | Defense Evasion | Adversaries may reduce the level of effort required to decrypt data transmitted over the network by … | Edit |