Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. unauthorized accessUpdated Jan 06, 2026

    Any access that violates the stated security policy.

  2. Unauthorized Command MessageUpdated Jan 06, 2026

    Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an Impact. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)

  3. Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by:

  4. Unix ShellUpdated Jan 06, 2026

    Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the underlying command prompts on Android and iOS devices. Unix shells can control every aspect of a system, with certain commands requiring elevated privileges that are only accessible if the device has been rooted or jailbroken.

  5. UpSkillUpdated Jan 06, 2026

    to provide someone, such as an employee, with more advanced skills through additional education and training

  6. URI HijackingUpdated Jan 06, 2026

    Adversaries may register Uniform Resource Identifiers (URIs) to intercept sensitive data.

  7. User EvasionUpdated Jan 06, 2026

    Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary’s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device.

  8. User ExecutionUpdated Jan 06, 2026

    Adversaries may rely on a targeted organizations user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents.