Figure SE.09 - Security Threat Technique : Class diagram
Created: |
3/28/2022 3:51:09 PM |
Modified: |
6/13/2022 4:00:54 PM |
Project: |
|
Author: |
broth |
Version: |
22.0 |
Advanced: |
|
ID: |
{7F51447C-46CB-4f2d-97AF-012C18482A6B} |
A threat actor may use multiple techniques to exploit a vulnerability on an IT resource. The existing Security Threat ABE pre-defines a few threat techniques, namely SQL, such as a SQL injection attack, PKI, such as spoofing a PKI certificate, and email, including phishing, social engineering, and malicious code attachments. <br/>