| Spyware threatens the integrity (unauthorised software) and availability (software consumes resources) of the host on which it is executed. It also threatens the user's privacy. |
| •owl:Thing |
| •Attack |
| •Threat |
| •Threat |
| •Attack |
| •ActiveAttack |
| •Deception |
| •Impersonation |
| •Masquerading |
| •Spoofing |
| •Impersonation |
| •Deception |
| •Masquerading |
| •Spoofing |
| •Masquerading |
| •Deception |
| •Impersonation |
| •Spoofing |
| •MaliciousCode |
| •Spyware |
| •Spoofing |
| •Deception |
| •Impersonation |
| •Masquerading |
| threatens SOME (_Privacy AND _Human) |
| MaliciousCode |
| threatens SOME (_Confidentiality AND _Data) |
| threatens SOME (_Integrity AND _Host) |
| threatens SOME (_Availability AND _Host) |
| dc:description | Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. (Webopedia) |
Class(Spyware partial restriction(threatens someValuesFrom(intersectionOf(_Privacy
_Human)))
MaliciousCode
restriction(threatens someValuesFrom(intersectionOf(_Confidentiality
_Data)))
restriction(threatens someValuesFrom(intersectionOf(_Integrity
_Host)))
restriction(threatens someValuesFrom(intersectionOf(_Availability
_Host))))