Skip to content

Enum: TechnicalImpactEnum

The different negative technical impacts that can result from a successful attack

leveraging a given attack pattern. A negative technical impact is the specific

technical effect of successfully violating a reasonable security policy for the

system or network.

URI: capec:TechnicalImpactEnum

Permissible Values

Value Meaning Description
Modify Data None The attacker can modify data stored within or processed by the target system
Read Data None The attacker can read sensitive or confidential data from the target system
Unreliable Execution None The execution of the target system becomes unreliable or unpredictable
Resource Consumption None Target system resources (CPU, memory, bandwidth) are consumed by the attack
Execute Unauthorized Commands None The attacker can execute unauthorized commands or code on the target system
Gain Privileges None The attacker gains elevated or unauthorized privileges on the target system
Bypass Protection Mechanism None The attacker can bypass existing security controls or protection mechanisms
Hide Activities None The attacker can conceal malicious activities from detection and monitoring
Alter Execution Logic None The attacker can alter the normal execution logic or control flow of the targ...
Other None Other technical impact not covered by the defined categories

Slots

Name Description
impact Describes the negative technical impact(s) that arise if an adversary success...
impact Describes the negative technical impact(s) that arise if an adversary success...

Identifier and Mapping Information

Schema Source

  • from schema: https://w3id.org/lmodel/capec

LinkML Source

name: TechnicalImpactEnum
description: 'The different negative technical impacts that can result from a successful
  attack

  leveraging a given attack pattern. A negative technical impact is the specific

  technical effect of successfully violating a reasonable security policy for the

  system or network.'
from_schema: https://w3id.org/lmodel/capec
rank: 1000
permissible_values:
  Modify Data:
    text: Modify Data
    description: The attacker can modify data stored within or processed by the target
      system.
  Read Data:
    text: Read Data
    description: The attacker can read sensitive or confidential data from the target
      system.
  Unreliable Execution:
    text: Unreliable Execution
    description: The execution of the target system becomes unreliable or unpredictable.
  Resource Consumption:
    text: Resource Consumption
    description: Target system resources (CPU, memory, bandwidth) are consumed by
      the attack.
  Execute Unauthorized Commands:
    text: Execute Unauthorized Commands
    description: The attacker can execute unauthorized commands or code on the target
      system.
  Gain Privileges:
    text: Gain Privileges
    description: The attacker gains elevated or unauthorized privileges on the target
      system.
  Bypass Protection Mechanism:
    text: Bypass Protection Mechanism
    description: The attacker can bypass existing security controls or protection
      mechanisms.
  Hide Activities:
    text: Hide Activities
    description: The attacker can conceal malicious activities from detection and
      monitoring.
  Alter Execution Logic:
    text: Alter Execution Logic
    description: The attacker can alter the normal execution logic or control flow
      of the target system.
  Other:
    text: Other
    description: Other technical impact not covered by the defined categories.