org.mitre.maec.default_vocabularies_1.IntegrityViolationTacticalObjectivesEnum10 Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of stix Show documentation
Show all versions of stix Show documentation
The Java bindings for STIX v.1.2.0.2
The newest version!
/**
* Copyright (c) 2015, The MITRE Corporation. All rights reserved.
* See LICENSE for complete terms.
*/
//
// This file was generated by the JavaTM Architecture for XML Binding(JAXB) Reference Implementation, v2.2.5-2
// See http://java.sun.com/xml/jaxb
// Any modifications to this file will be lost upon recompilation of the source schema.
// Generated on: 2015.07.01 at 03:19:53 PM EDT
//
package org.mitre.maec.default_vocabularies_1;
import javax.xml.bind.annotation.XmlEnum;
import javax.xml.bind.annotation.XmlEnumValue;
import javax.xml.bind.annotation.XmlType;
/**
* Java class for IntegrityViolationTacticalObjectivesEnum-1.0.
*
*
The following schema fragment specifies the expected content contained within this class.
*
*
* <simpleType name="IntegrityViolationTacticalObjectivesEnum-1.0">
* <restriction base="{http://www.w3.org/2001/XMLSchema}string">
* <enumeration value="subvert system"/>
* <enumeration value="corrupt system data"/>
* <enumeration value="annoy local system user"/>
* <enumeration value="intercept/manipulate network traffic"/>
* <enumeration value="annoy remote user"/>
* <enumeration value="corrupt user data"/>
* </restriction>
* </simpleType>
*
*
*/
@XmlType(name = "IntegrityViolationTacticalObjectivesEnum-1.0")
@XmlEnum
public enum IntegrityViolationTacticalObjectivesEnum10 {
/**
* The 'subvert system' value indicates that the malware instance is able to subvert a system to perform beyond its operational boundaries or to perform tasks for which it was not originally intended.
*
*/
@XmlEnumValue("subvert system")
SUBVERT_SYSTEM("subvert system"),
/**
* The 'corrupt system data' value indicates that the malware instance is able to corrupt a system's data.
*
*/
@XmlEnumValue("corrupt system data")
CORRUPT_SYSTEM_DATA("corrupt system data"),
/**
* The 'annoy local system user' value indicates that the malware instance is able to annoy local system users.
*
*/
@XmlEnumValue("annoy local system user")
ANNOY_LOCAL_SYSTEM_USER("annoy local system user"),
/**
* The 'intercept/manipulate network traffic' value indicates that the malware is able to intercept and/or manipulate traffic on a network.
*
*/
@XmlEnumValue("intercept/manipulate network traffic")
INTERCEPT_MANIPULATE_NETWORK_TRAFFIC("intercept/manipulate network traffic"),
/**
* The 'annoy remote user' value indicates that the malware instance is able to annoy a remote user.
*
*/
@XmlEnumValue("annoy remote user")
ANNOY_REMOTE_USER("annoy remote user"),
/**
* The 'corrupt user data' value indicates that the malware instance is able to corrupt a system's user data.
*
*/
@XmlEnumValue("corrupt user data")
CORRUPT_USER_DATA("corrupt user data");
private final String value;
IntegrityViolationTacticalObjectivesEnum10(String v) {
value = v;
}
public String value() {
return value;
}
public static IntegrityViolationTacticalObjectivesEnum10 fromValue(String v) {
for (IntegrityViolationTacticalObjectivesEnum10 c : IntegrityViolationTacticalObjectivesEnum10
.values()) {
if (c.value.equals(v)) {
return c;
}
}
throw new IllegalArgumentException(v);
}
}