The intentional use (by authorized users) of system resources for other than authorized purposes. Example: An authorized system administrator creates an unauthorized account for a friend. (See: misuse detection.)
The intentional use (by authorized users) of system resources for other than authorized purposes. Example: An authorized system administrator creates an unauthorized account for a friend. (See: misuse detection.)
A type of threat action that causes a system component to perform a function or service that is detrimental to system security. (See: usurpation.)
Usage: This type of threat action includes the following subtypes: