Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Threats Information Page (Threat consequence (Disruption…
Cyber Threats
Information Page
Threat consequence
Deception
Repudiation
False denial of origin
False denial of receipt
Masquerade
Malicious logic
Spoof
Disruption
Incapacitation
Malicious logic
Physical destruction
Human error
Hardware or software error
Natural disaster
Corruption
Tamper
Malicious logic
Human error
Hardware or software error
Natural disaster
Obstruction
Interference
Overload
Usurpation
Misappropriation
Theft of service
Theft of functionality
Theft of data
Misuse
Tamper
Malicious logic
Violation of permissions
Threat management
Information security audit
Penetration test
Cyber threat management (CTM)
Manual and automated intelligence gathering and threat analytics
Comprehensive methodology for real-time monitoring including advanced techniques such as behavioural modelling
Use of advanced analytics to optimize intelligence, generate security intelligence, and provide Situational Awareness
Technology and skilled people leveraging situational awareness to enable rapid decisions and automated or manual actions