Skip to main content
. 2022 Nov 2;82(11):16951–16971. doi: 10.1007/s11042-022-14036-y

Table 2.

Inputs and potential result of threat agents

Pre-Requisites inputs of threat agents Potential results of the threat agents
Credential. Credential acquisitions.
Root privileges. Privilege escalation.
Remote access. Remote access.
Local access. Denial of services.
Network access. Run arbitrary commands.
Data access.
Data manipulation.