An adversary installs and executes malicious code on the target system in an effort to achieve a negative technical impact. Examples include rootkits, ransomware, spyware, adware, and others.
Description
Mitigations
4
Consequences
Relationships
Resources Required
1