Figure SE.11 - Security Threat Tool : Class diagram
Created: |
3/28/2022 3:51:09 PM |
Modified: |
6/23/2022 4:17:32 PM |
Project: |
|
Author: |
broth |
Version: |
22.0 |
Advanced: |
|
ID: |
{75899821-A33A-4049-AB33-7A47D9F12081} |
A threat actor may use organized and distributed software to attack an IT resource or service. The current model only defines three types of threat tools as examples. Threat tools include viruses, botnets, and other software that enables or automates a threat actor’s attack. Currently in the model, a there is a network of virtual tunnels that is used to anonymously perform a cyber-attack, a peer-to-peer file sharing application is used to distribute malicious code as part of a cyber-attack, and a botnet is used as an attacker.<br/>