Exfiltration Attacks
Exfiltration Attacks
- Control
Document and assess whether the data employed and gathered by the Product, and the intellectual property generated possess value for potential adversarial actors.
- Aim
To (a) identify the risks associated with (i) Product Subject physical, financial, social and psychological wellbeing, and (ii) Organization financial wellbeing; and (b) highlight associated risks that might occur in the Product Lifecycle.