Shadow IT

From Cognitive Attack Taxonomy

Shadow IT

Short Description: Intentional use of an unauthorized information technology resource.

CAT ID: CAT-2022-232

Layer: 9

Operational Scale: Tactical

Level of Maturity: Well-Established

Category: Vulnerability

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Intentional use of an unauthorized information technology resource (such as cloud service, email service, or wireless acces point) to acess organizational resources or accomplish organizational tasks and objectives.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: