- AR4
- -IF011
- -IF011.001
Intentionally Weakening Network Security Controls For a Third Party - AR4
Contributor: The ITM Team @ - Subsection IF011.001
- AR4
- -IF011
- -IF011.002
Intentionally Weakening Physical Security Controls For a Third Party - AR4
Contributor: The ITM Team @ - Subsection IF011.002
- AR4
- -IF002
- -IF002.005
Exfiltration via Physical Documents - AR4
Contributor: The ITM Team @ - Subsection IF002.005
- AR2
- -ME006
- -ME006.006
Code Repositories - AR2
Contributor: The ITM Team @ - Subsection ME006.006
- AR1
- -MT005
- -MT005.001
Speculative Corporate Espionage - AR1
Contributor: The ITM Team @ - Subsection MT005.001
- AR4
- -IF009
- -IF009.001
Unwanted Software - AR4
Contributor: The ITM Team @ - Subsection IF009.001
- AR4
- -IF009
- -IF009.002
Inappropriate Software - AR4
Contributor: The ITM Team @ - Subsection IF009.002
- AR4
- -IF009
- -IF009.003
Unintentionally Introducing Malware - AR4
Contributor: The ITM Team @ - Subsection IF009.003
- AR4
- -IF009
- -IF009.004
Intentionally Introducing Malware - AR4
Contributor: The ITM Team @ - Subsection IF009.004
- AR2
- -ME021
- -ME021.001
User Account Credentials - AR2
Contributor: The ITM Team @ - Subsection ME021.001