All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.mitre.maec.default_vocabularies_1.IntegrityViolationTacticalObjectivesEnum10 Maven / Gradle / Ivy

There is a newer version: 1.2.0.2
Show newest version
/**
 * Copyright (c) 2015, The MITRE Corporation. All rights reserved.
 * See LICENSE for complete terms.
 */

//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2 
// See http://java.sun.com/xml/jaxb 
// Any modifications to this file will be lost upon recompilation of the source schema. 
// Generated on: 2015.06.23 at 10:59:44 AM EDT 
//

package org.mitre.maec.default_vocabularies_1;

import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;

/**
 * 

Java class for IntegrityViolationTacticalObjectivesEnum-1.0. * *

The following schema fragment specifies the expected content contained within this class. *

*

 * <simpleType name="IntegrityViolationTacticalObjectivesEnum-1.0">
 *   <restriction base="{http://www.w3.org/2001/XMLSchema}string">
 *     <enumeration value="subvert system"/>
 *     <enumeration value="corrupt system data"/>
 *     <enumeration value="annoy local system user"/>
 *     <enumeration value="intercept/manipulate network traffic"/>
 *     <enumeration value="annoy remote user"/>
 *     <enumeration value="corrupt user data"/>
 *   </restriction>
 * </simpleType>
 * 
* */ @XmlType(name = "IntegrityViolationTacticalObjectivesEnum-1.0") @XmlEnum public enum IntegrityViolationTacticalObjectivesEnum10 { /** * The 'subvert system' value indicates that the malware instance is able to subvert a system to perform beyond its operational boundaries or to perform tasks for which it was not originally intended. * */ @XmlEnumValue("subvert system") SUBVERT_SYSTEM("subvert system"), /** * The 'corrupt system data' value indicates that the malware instance is able to corrupt a system's data. * */ @XmlEnumValue("corrupt system data") CORRUPT_SYSTEM_DATA("corrupt system data"), /** * The 'annoy local system user' value indicates that the malware instance is able to annoy local system users. * */ @XmlEnumValue("annoy local system user") ANNOY_LOCAL_SYSTEM_USER("annoy local system user"), /** * The 'intercept/manipulate network traffic' value indicates that the malware is able to intercept and/or manipulate traffic on a network. * */ @XmlEnumValue("intercept/manipulate network traffic") INTERCEPT_MANIPULATE_NETWORK_TRAFFIC("intercept/manipulate network traffic"), /** * The 'annoy remote user' value indicates that the malware instance is able to annoy a remote user. * */ @XmlEnumValue("annoy remote user") ANNOY_REMOTE_USER("annoy remote user"), /** * The 'corrupt user data' value indicates that the malware instance is able to corrupt a system's user data. * */ @XmlEnumValue("corrupt user data") CORRUPT_USER_DATA("corrupt user data"); private final String value; IntegrityViolationTacticalObjectivesEnum10(String v) { value = v; } public String value() { return value; } public static IntegrityViolationTacticalObjectivesEnum10 fromValue(String v) { for (IntegrityViolationTacticalObjectivesEnum10 c : IntegrityViolationTacticalObjectivesEnum10 .values()) { if (c.value.equals(v)) { return c; } } throw new IllegalArgumentException(v); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy