- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Credential Theft Scenario
Learn about the Compromised Credentials Credential Theft scenario.
The Credential Theft scenario describes when an attacker dumps credentials to obtain account login and credential information or sniffs network traffic to intercept information about an environment, like authentication information.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Credential Theft scenario falls under the Compromised Credentials use case.