Enum: TechnicalImpactEnum
The different negative technical impacts that can result from a successful attack
leveraging a given attack pattern. A negative technical impact is the specific
technical effect of successfully violating a reasonable security policy for the
system or network.
URI: capec:TechnicalImpactEnum
Permissible Values
| Value | Meaning | Description |
|---|---|---|
| Modify Data | None | The attacker can modify data stored within or processed by the target system |
| Read Data | None | The attacker can read sensitive or confidential data from the target system |
| Unreliable Execution | None | The execution of the target system becomes unreliable or unpredictable |
| Resource Consumption | None | Target system resources (CPU, memory, bandwidth) are consumed by the attack |
| Execute Unauthorized Commands | None | The attacker can execute unauthorized commands or code on the target system |
| Gain Privileges | None | The attacker gains elevated or unauthorized privileges on the target system |
| Bypass Protection Mechanism | None | The attacker can bypass existing security controls or protection mechanisms |
| Hide Activities | None | The attacker can conceal malicious activities from detection and monitoring |
| Alter Execution Logic | None | The attacker can alter the normal execution logic or control flow of the targ... |
| Other | None | Other technical impact not covered by the defined categories |
Slots
| Name | Description |
|---|---|
| impact | Describes the negative technical impact(s) that arise if an adversary success... |
| impact | Describes the negative technical impact(s) that arise if an adversary success... |
Identifier and Mapping Information
Schema Source
- from schema: https://w3id.org/lmodel/capec
LinkML Source
name: TechnicalImpactEnum
description: 'The different negative technical impacts that can result from a successful
attack
leveraging a given attack pattern. A negative technical impact is the specific
technical effect of successfully violating a reasonable security policy for the
system or network.'
from_schema: https://w3id.org/lmodel/capec
rank: 1000
permissible_values:
Modify Data:
text: Modify Data
description: The attacker can modify data stored within or processed by the target
system.
Read Data:
text: Read Data
description: The attacker can read sensitive or confidential data from the target
system.
Unreliable Execution:
text: Unreliable Execution
description: The execution of the target system becomes unreliable or unpredictable.
Resource Consumption:
text: Resource Consumption
description: Target system resources (CPU, memory, bandwidth) are consumed by
the attack.
Execute Unauthorized Commands:
text: Execute Unauthorized Commands
description: The attacker can execute unauthorized commands or code on the target
system.
Gain Privileges:
text: Gain Privileges
description: The attacker gains elevated or unauthorized privileges on the target
system.
Bypass Protection Mechanism:
text: Bypass Protection Mechanism
description: The attacker can bypass existing security controls or protection
mechanisms.
Hide Activities:
text: Hide Activities
description: The attacker can conceal malicious activities from detection and
monitoring.
Alter Execution Logic:
text: Alter Execution Logic
description: The attacker can alter the normal execution logic or control flow
of the target system.
Other:
text: Other
description: Other technical impact not covered by the defined categories.