org.mitre.maec.default_vocabularies_1.AvailabilityViolationTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:30:29 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for AvailabilityViolationTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="AvailabilityViolationTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="denial of service"/>
* <enumeration value="compromise local system availability"/>
* <enumeration value="crack passwords"/>
* <enumeration value="mine for cryptocurrency"/>
* <enumeration value="compromise access to information assets"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "AvailabilityViolationTacticalObjectivesEnum-1.0")
@XmlEnum
public enum AvailabilityViolationTacticalObjectivesEnum10 {
/**
* The 'denial of service' value indicates that the malware instance is able to cause a server to be unavailable, otherwise known as a denial of service (DOS).
*
*/
@XmlEnumValue("denial of service")
DENIAL_OF_SERVICE("denial of service"),
/**
* The 'compromise local system availability' value indicates that the malware instance is able to cause the local system to be unavailable.
*
*/
@XmlEnumValue("compromise local system availability")
COMPROMISE_LOCAL_SYSTEM_AVAILABILITY("compromise local system availability"),
/**
* The 'crack passwords' value indicates that the malware instance is able to consume system resources for password cracking.
*
*/
@XmlEnumValue("crack passwords")
CRACK_PASSWORDS("crack passwords"),
/**
* The 'mine for cryptocurrency' value indicates that the malware instance is able to consume system resources for cryptocurrency mining.
*
*/
@XmlEnumValue("mine for cryptocurrency")
MINE_FOR_CRYPTOCURRENCY("mine for cryptocurrency"),
/**
* The 'compromise access to information assets' value indicates that the malware instance is able to prevent data from being accessed (e.g., by encrypting user data on a compromised system).
*
*/
@XmlEnumValue("compromise access to information assets")
COMPROMISE_ACCESS_TO_INFORMATION_ASSETS(
"compromise access to information assets");
private final String value;
AvailabilityViolationTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static AvailabilityViolationTacticalObjectivesEnum10 fromValue(
String v) {
for (AvailabilityViolationTacticalObjectivesEnum10 c : AvailabilityViolationTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}