Class: sec:Rootkit

•owl:Thing
        •sec:Threat
                •sec:ActiveAttack
                        •sec:Deception
                                •sec:Impersonation
                                •sec:Masquerading
                                •sec:Spoofing
                        •sec:Impersonation
                                •sec:Deception
                                •sec:Masquerading
                                •sec:Spoofing
                        •sec:Masquerading
                                •sec:Deception
                                •sec:Impersonation
                                •sec:Spoofing
                                •sec:MaliciousCode
                                        •sec:Rootkit
                        •sec:Spoofing
                                •sec:Deception
                                •sec:Impersonation
                                •sec:Masquerading

Super Classes

sec:ifSuccessfulLeadsToThreat SOME sec:MaliciousCode
sec:MaliciousCode
sec:threatens SOME (sec:_Integrity AND sec:_Host)

Annotations

dc:descriptionA collection of software tools installed by an intruder on a compromised computer. A rootkit will normally contain tools to hide evidence of the intrusion and backdoors to allow access or remote-control in future. Rootkits often include tools to facilitate other types of misuse such as distributed denial of service attacks or distribution of spam. (ODoC)

Abstract Syntax

Class(sec:Rootkit partial restriction(sec:ifSuccessfulLeadsToThreat someValuesFrom(sec:MaliciousCode))
                         sec:MaliciousCode
                         restriction(sec:threatens someValuesFrom(intersectionOf(sec:_Integrity
                                                                                 sec:_Host))))
Generated with OWLDoc