Skip to content
SynAc
Term

misappropriation

A type of threat action whereby an entity assumes unauthorized logical or physical control of a system resource. (See: usurpation.)

Senses

(I)

A type of threat action whereby an entity assumes unauthorized logical or physical control of a system resource. (See: usurpation.)

Usage: This type of threat action includes the following subtypes:

  • Theft of data: Unauthorized acquisition and use of data contained in a system.
  • Theft of service: Unauthorized use of a system service.
  • Theft of functionality: Unauthorized acquisition of actual hardware, firmware, or software of a system component.
References
  • IETF RFC 4949 (Internet Security Glossary)Jan 06, 2026
    RFC 4949 — Internet Security Glossary (Version 2)
    https://www.rfc-editor.org/rfc/rfc4949.txt
    RFC 4949 is published by the IETF Trust and marked as "Distribution of this memo is unlimited". Verify IETF Trust copyright/licensing terms for reuse.
    Source: IETF RFC 4949 (rfc-editor.org).