All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.mitre.maec.default_vocabularies_1.AvailabilityViolationTacticalObjectivesEnum10 Maven / Gradle / Ivy

There is a newer version: 1.2.0.2
Show newest version
/**
 * Copyright (c) 2015, The MITRE Corporation. All rights reserved.
 * See LICENSE for complete terms.
 */

//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2 
// See http://java.sun.com/xml/jaxb 
// Any modifications to this file will be lost upon recompilation of the source schema. 
// Generated on: 2015.06.23 at 10:59:44 AM EDT 
//

package org.mitre.maec.default_vocabularies_1;

import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;

/**
 * 

Java class for AvailabilityViolationTacticalObjectivesEnum-1.0. * *

The following schema fragment specifies the expected content contained within this class. *

*

 * <simpleType name="AvailabilityViolationTacticalObjectivesEnum-1.0">
 *   <restriction base="{http://www.w3.org/2001/XMLSchema}string">
 *     <enumeration value="denial of service"/>
 *     <enumeration value="compromise local system availability"/>
 *     <enumeration value="crack passwords"/>
 *     <enumeration value="mine for cryptocurrency"/>
 *     <enumeration value="compromise access to information assets"/>
 *   </restriction>
 * </simpleType>
 * 
* */ @XmlType(name = "AvailabilityViolationTacticalObjectivesEnum-1.0") @XmlEnum public enum AvailabilityViolationTacticalObjectivesEnum10 { /** * The 'denial of service' value indicates that the malware instance is able to cause a server to be unavailable, otherwise known as a denial of service (DOS). * */ @XmlEnumValue("denial of service") DENIAL_OF_SERVICE("denial of service"), /** * The 'compromise local system availability' value indicates that the malware instance is able to cause the local system to be unavailable. * */ @XmlEnumValue("compromise local system availability") COMPROMISE_LOCAL_SYSTEM_AVAILABILITY("compromise local system availability"), /** * The 'crack passwords' value indicates that the malware instance is able to consume system resources for password cracking. * */ @XmlEnumValue("crack passwords") CRACK_PASSWORDS("crack passwords"), /** * The 'mine for cryptocurrency' value indicates that the malware instance is able to consume system resources for cryptocurrency mining. * */ @XmlEnumValue("mine for cryptocurrency") MINE_FOR_CRYPTOCURRENCY("mine for cryptocurrency"), /** * The 'compromise access to information assets' value indicates that the malware instance is able to prevent data from being accessed (e.g., by encrypting user data on a compromised system). * */ @XmlEnumValue("compromise access to information assets") COMPROMISE_ACCESS_TO_INFORMATION_ASSETS( "compromise access to information assets"); private final String value; AvailabilityViolationTacticalObjectivesEnum10(String v) { value = v; } public String value() { return value; } public static AvailabilityViolationTacticalObjectivesEnum10 fromValue( String v) { for (AvailabilityViolationTacticalObjectivesEnum10 c : AvailabilityViolationTacticalObjectivesEnum10 .values()) { if (c.value.equals(v)) { return c; } } throw new IllegalArgumentException(v); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy