Package Theft
URI: Theft
Description: Model of device theft and reconnection of stolen devices.
        (empty)
        (empty)
        (empty)
Model of device theft and reconnection of stolen devices. |
|
Untrusted, potentially malicious agents gained control of a device or process running on it after the device has been removed by theft from the system. |
A device or a process running on the device is still controlled by a trustworthy actor or process in some context after the device has been stolen by an attacker. |
|
Attribute signifying that a (mobile) device is in the hands of the right user. |