- AR3
- -PR017
- -PR017.004
Archive via Encryption - AR3
Contributor: The ITM Team @ - Subsection PR017.004
- AR4
- -IF010
- -IF010.001
Exfiltration via Corporate Email - AR4
Contributor: The ITM Team @ - Subsection IF010.001
- AR4
- -IF010
- -IF010.002
Exfiltration via Personal Email - AR4
Contributor: The ITM Team @ - Subsection IF010.002
- AR4
- -IF011
- -IF011.001
Intentionally Weakening Network Security Controls For a Third Party - AR4
Contributor: The ITM Team @ - Subsection IF011.001
- AR4
- -IF011
- -IF011.002
Intentionally Weakening Physical Security Controls For a Third Party - AR4
Contributor: The ITM Team @ - Subsection IF011.002
- AR4
- -IF002
- -IF002.005
Exfiltration via Physical Documents - AR4
Contributor: The ITM Team @ - Subsection IF002.005
- AR2
- -ME006
- -ME006.006
Code Repositories - AR2
Contributor: The ITM Team @ - Subsection ME006.006
- AR1
- -MT005
- -MT005.001
Speculative Corporate Espionage - AR1
Contributor: The ITM Team @ - Subsection MT005.001
- AR4
- -IF009
- -IF009.001
Unwanted Software - AR4
Contributor: The ITM Team @ - Subsection IF009.001
- AR4
- -IF009
- -IF009.002
Inappropriate Software - AR4
Contributor: The ITM Team @ - Subsection IF009.002