An adversary gains physical access to a system or device through theft of the item. Possession of a system or device enables a number of unique attacks to be executed and often provides the adversary with an extended timeframe for which to perform an attack. Most protections put in place to secure sensitive information can be defeated when an adversary has physical access and enough time.
The table below shows the views that this attack pattern belongs to and top level categories within that view.
This type of attack requires the existence of a physical target that an adversary believes hosts something of value.
To mitigate this type of attack, physical security techniques such as locks doors, alarms, and monitoring of targets should be implemented.
CAPEC Content Team
The MITRE Corporation
More information is available — Please select a different filter.
Page Last Updated or Reviewed:
September 30, 2019