CAPEC-578: Disable Security Software

An adversary exploits a weakness in access control to disable security tools so that detection does not occur. This can take the form of killing processes, deleting registry keys so that tools do not start at run time, deleting log files, or other methods.

Severity
Medium
Likelihood
Medium
6
/ 100
low-risk
Active Threat 5/50 · Minimal
Exploit Availability 1/50 · Minimal