Models¶
Impact¶
Account Access Removal¶
Techniques: Account Access Removal
Application Denial of Service¶
Techniques: Endpoint Denial of Service, Network Denial of Service, Resource Hijacking, Service Stop, System Shutdown/Reboot
Data Disruptions¶
Techniques: Data Destruction, Data Encrypted for Impact, Data Manipulation, Defacement, Disk Wipe, Inhibit System Recovery
Firmware Corruption¶
Techniques: Firmware Corruption