Securitypatterns.io Threat Library ()
Securitypatterns.io Threat Library
SP-TE-01: Disaster or major events in the environment
SP-TE-02: Unfavourable climatic conditions
SP-TE-03: Fraud
SP-TE-04: Sabotage
SP-TE-05: Physical theft
SP-TE-06: Unauthorized physical access or entry to premises
SP-TE-07: Coercion, extortion or blackmail
SP-TE-08: Warfare or terrorists attack
SP-TE-09: Accidental leaks or sharing of information due to human error or mishandling
SP-TE-10: Leaks of information or data through applications flaws, misconfigured services or system errors.
SP-TE-11: Disruption to information systems due to misconfiguration or maintenance errors
SP-TE-12: Unintentional change of data within information system
SP-TE-13: Inadequate design and planning leading to improper deployment
SP-TE-14: Inadequate workflows or processes leading to flaws in deployment
SP-TE-15: Unintentional damages through security testing
SP-TE-16: Unintentional destruction of records through mismanaged data repositories or storage
SP-TE-17: System failure or corruption of information systems, devices or media
SP-TE-18: Failure or disruption of network infrastructure, connectivity or communication links
SP-TE-19: Failure within information systems due to disruption or unavailability of dependant external supply chains
SP-TE-20: Interception of information due to publicly accessible insecure or rouge remote access points
SP-TE-21: Network reconnaissance and information gathering
SP-TE-22: Session hijacking
SP-TE-23: Adversary in the middle attack or network traffic modification
SP-TE-24: Identity theft
SP-TE-25: Generation of false identities
SP-TE-26: Abuse of resources through misconfiguration
SP-TE-27: Exploit hardware or platform vulnerabilities
SP-TE-28: Infection from malware, worms or trojans
SP-TE-29: Web application attacks or code injection attack
SP-TE-30: Rogue software masquerading as trusted application
SP-TE-31: Unauthorized changes or manipulation of application functionality or code
SP-TE-32: Social engineering or phishing attacks
SP-TE-33: Receive of unsolicited e-mail
SP-TE-34: Violate isolation in multi-tenant environment
SP-TE-35: Lack of security insights, monitoring or manipulation of audit log integrity
SP-TE-36: Unauthorized changes or manipulation of information data records
SP-TE-37: Compromise of confidential information or data breach
SP-TE-38: Destruction of records through malicious user or malware infection
SP-TE-39: Distributed Denial of service (DDoS) across network layers
SP-TE-40: Distributed Denial of service (DDoS) across application services
SP-TE-41: Brute force attempts on user or system accounts
SP-TE-42: Denial of service on hosting platform or system services