Measures designed to permanently eliminate the use of a system, potentially through some physical damage to the system. Threat actors may destroy data, commands, subsystems, or attempt to destroy the victim spacecraft itself. This behavior is different from Degradation, as the individual parts are destroyed rather than put in a position in which they would slowly degrade over time.
ID | Name | Description | NIST Rev5 | D3FEND | ISO 27001 |
ID | Name | Description | STIX Pattern |