Spyware threatens the integrity (unauthorised software) and availability (software consumes resources) of the host on which it is executed. It also threatens the user's privacy. |
•owl:Thing |
•Attack |
•Threat |
•Threat |
•Attack |
•ActiveAttack |
•Deception |
•Impersonation |
•Masquerading |
•Spoofing |
•Impersonation |
•Deception |
•Masquerading |
•Spoofing |
•Masquerading |
•Deception |
•Impersonation |
•Spoofing |
•MaliciousCode |
•Spyware |
•Spoofing |
•Deception |
•Impersonation |
•Masquerading |
threatens SOME (_Privacy AND _Human) |
MaliciousCode |
threatens SOME (_Confidentiality AND _Data) |
threatens SOME (_Integrity AND _Host) |
threatens SOME (_Availability AND _Host) |
dc:description | Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. (Webopedia) |
Class(Spyware partial restriction(threatens someValuesFrom(intersectionOf(_Privacy _Human))) MaliciousCode restriction(threatens someValuesFrom(intersectionOf(_Confidentiality _Data))) restriction(threatens someValuesFrom(intersectionOf(_Integrity _Host))) restriction(threatens someValuesFrom(intersectionOf(_Availability _Host))))