A type of threat action whereby an entity assumes unauthorized logical or physical control of a system resource. (See: usurpation.)
A type of threat action whereby an entity assumes unauthorized logical or physical control of a system resource. (See: usurpation.)
Usage: This type of threat action includes the following subtypes: