T.Malicious_Code.App.1
|
High
|
Likely
|
An entity implants malicious code in an application in order to modify the operating system, other applications, or data leading to disclosure of information assets, modification of information assets, denial of service, repudiation.
|
T.Malicious_Code.App.2
|
High
|
Likely
|
An entity implants malicious code in an application in order to modify the operating system, other applications, or data leading to exfiltration of information assets to potential covert channels.
|
T.Malicious_Code.App.3
|
High
|
Unlikely
|
An entity implants malicious code in an application in order to receive covert channel communication to direct the application to modify the operating system, other applications, or data. (See T.Malicious_Code.App.1 and T.Malicious_Code.App.2)
|
T.Malicious_Code.App.4
|
High
|
Likely
|
An entity implants malicious code in an application in order to attack external entities through a AMI interface.
|
T.Malicious_Code.Info.1
|
Medium
|
Likely
|
An entity implants malicious code in an information asset in order to gain access to an asset it is not authorized to access.
|
T.Malicious_Code.Info.2
|
Medium
|
Likely
|
An entity implants malicious code in an information asset in order to exfiltrate information assets to a potential covert channel.
|
T.Malicious_Code.Info.3
|
Medium
|
Likely
|
An entity implants malicious code in a AMI component information asset in order to modify information assets.
|
T.Malicious_Code.Info.4
|
Low
|
Unlikely
|
An entity implants malicious code in a information asset in order to launch a denial of service attack.
|
T.Malicious_Code.Info.5
|
Medium
|
Likely
|
An entity causes a user to execute malicious code in a AMI component information asset in order to modify information assets.
|
T.Malicious_Code.Info.6
|
Medium
|
Likely
|
An entity causes a user to execute malicious code in an information asset in order to gain access to an asset.
|
T.Malicious_Code.Info.7
|
Medium
|
Likely
|
An entity causes a user to execute malicious code in an information asset in order to exfiltrate information assets to a potential covert channel.
|
T.Malicious_Code.Info.8
|
Low
|
Unlikely
|
An entity causes a user to execute malicious code in an information asset in order to launch a denial of service attack.
|
T.Malicious_Code.Proxy.1
|
Medium
|
Unlikely
|
An entity implants malicious code in an AMI system security domain component to enable an authorized entity to act as a proxy for him.
|
T.Malicious_Code.Res.1
|
Medium
|
Likely
|
An entity implants malicious code in an AMI component resource asset in order to gain access to an asset.
|
T.Malicious_Code.Res.2
|
High
|
Likely
|
An entity implants malicious code in an AMI component resource asset in order to exfiltrate information assets to a potential covert channel.
|
T.Malicious_Code.Res.3
|
High
|
Likely
|
An entity implants malicious code in an AMI component resource asset in order to modify information assets.
|
T.Malicious_Code.Res.4
|
Medium
|
Unlikely
|
An entity implants malicious code in an AMI component resource asset in order to launch a denial of service attack.
|
T.Malicious_Code.Res.5
|
Medium
|
Likely
|
An entity causes a user to execute malicious code in an AMI component resource asset in order to gain access to an asset it is not authorized to access.
|
T.Malicious_Code.Res.6
|
Medium
|
Likely
|
An entity causes a user to execute malicious code in an AMI component resource asset in order to exfiltrate information assets to a potential covert channel.
|
T.Malicious_Code.Res.7
|
Low
|
Unlikely
|
An entity causes a user to execute malicious code in an AMI component resource asset in order to launch a denial of service attack.
|
|