It Enters the Environment Description Attack Method / Threat Security awareness training, email filtering, MFA Account compromise, data breach Users / Credentials Email links, fake websites, messaging platforms Tricks users into revealing credentials or executing malicious actions Phishing / Social Engineering Anti-malware, patching, endpoint protection Data loss, system compromise Endpoints / Servers Email attachments, downloads, USB devices, compromised websites Malicious software that infects systems Malware (Virus, Worm, Trojan) Backups, patching, network segmentation Business disruption, data loss Servers / Endpoints Phishing emails, RDP exposure, vulnerabilities Encrypts data and demands payment Ransomware Input validation, parameterised queries, WAF Data exposure, data manipulation Databases Web application input fields Injects malicious SQL into input fields SQL Injection Input/output sanitisation, secure coding Session hijacking, data theft Users (via browser) Vulnerable web applications Injects malicious scripts into web pages Cross-Site Scripting (XSS) Encryption (TLS), VPNs, secure Wi-Fi Data interception, credential theft Network traffic Unsecured networks (Wi-Fi), compromised routers Intercepts communication between parties Man-in-the-Middle (MITM) MFA, account lockout, strong password policies Account takeover Authentication systems Login interfaces, exposed services Attempts to guess or reuse passwords Password Attacks (Brute Force / Credential Stuffing) Traffic filtering, rate limiting, DDoS protection Service disruption Applications / Networks Internet-facing services Overwhelms systems to make them unavailable Denial of Service (DoS / DDoS) Access controls, monitoring, segregation of duties Data leakage, fraud Internal systems / data Legitimate access (authorised users) Internal user misuses access Insider Threat (Malicious / Negligent) Patch management, threat intelligence, monitoring Full system compromise Applications / OS Unpatched systems, unknown flaws Exploits unknown vulnerability Zero-Day Exploit Browser security, patching, web filtering Silent infection User endpoints Compromised websites, ads Malware installed by visiting a site Drive-by Download Threat monitoring, endpoint protection Targeted compromise Specific user groups Frequently visited sites Compromises trusted websites Watering Hole Attack Vendor risk management, code validation Widespread compromise Systems / Applications Software updates, vendors Compromise via third-party software or vendors Supply Chain Attack Least privilege, patching, monitoring Full control of system Systems / Admin accounts Exploiting vulnerabilities or misconfigurations Gains higher access rights Privilege Escalation DLP, monitoring, encryption Data breach, compliance issues Sensitive data Email, cloud storage, USB, covert channels Unauthorised data transfer out of environment Data Exfiltration Network monitoring, endpoint protection DDoS, spam, further attacks Distributed systems Malware infections Network of compromised devices used for attacks Botnets