7
|
Account Access Removal
|
20
|
Application Exhaustion Flood
|
24
|
Application or System Exploitation
|
117
|
Data Destruction
|
119
|
Data Encrypted for Impact
|
120
|
Data Manipulation
|
131
|
Defacement
|
141
|
Direct Network Flood
|
149
|
Disk Content Wipe
|
150
|
Disk Structure Wipe
|
151
|
Disk Wipe
|
184
|
Endpoint Denial of Service
|
212
|
External Defacement
|
223
|
Firmware Corruption
|
257
|
Inhibit System Recovery
|
263
|
Internal Defacement
|
324
|
Network Denial of Service
|
340
|
OS Exhaustion Flood
|
399
|
Reflection Amplification
|
412
|
Resource Hijacking
|
419
|
Runtime Data Manipulation
|
450
|
Service Exhaustion Flood
|
451
|
Service Stop
|
485
|
Stored Data Manipulation
|
499
|
System Shutdown/Reboot
|
517
|
Transmitted Data Manipulation
|