PAPO ontologically unpacks our characterization of the phishing attack process as a complex event wherein: (1) a phisher impersonates a reputable agent, (2) exploits the target's trust in this agent, (3) aims to trick the target into taking the attacker's desired action, (4) offering supposedly plausible reasons for this behavior.
Classes: | Agent | Belief | Complacency | Curiosity | DesireToPlease | Distraction | Email | Fear | Fraud | FulfillmentOfPhishersRequest | Greed | HookWebpage | Hurry | Ignorance | ImpersonatedReputableAgent | IndividualPhisher | Influence | Innocence | Intention | Loneliness | LureEmail | LureMessage | LureMessageArrival | LureMessageDispatch | LureMessagePerception | MentalAttitude | Organization | Person | Phisher | PhisherOrganization | PhishingAttackCapability | PhishingAttackExecution | PhishingAttackPlanning | PhishingAttackPreparation | PhishingAttackProcess | PhishingEnabler | PhishingParticipantTrustee | PhishingPlan | PhishingTarget | PostAttackPhase | TargetAsset | TargetFragility | TargetTrust | TrustBasedAction | Urgency | Vulnerability | VulnerabilityCondition | Webpage
Object Properties: | acquiredThrough | aimsToCatch | aimsToEnable | aimsToImpersonate | aimsToTrick | beliefInheresInPhishingTarget | carriedOut | considers | createdBy | dependsOn | designedBy | discusses | dispatchedTo | employs | enabled | executed | experienced | facilitates | forawardsTo | fraudHistoricallyDependsOnPhishingAttackExecution | fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception | impersonated | influences | intentionInheresInPhishingTarget | involvedIn | lureMessageArrivalHistoricallyDependsOnLureMessageDispatch | lureMessageParticipatedInPhishingAttackExecution | lureMessagePerceptionHistoricallyDependsOnLureMessageArrival | made | phishingAttackCapabilityInheresInPhisher | phishingAttackCapabilityManifestedInPhishingAttackExecution | phishingAttackExecutionHasFulfillmentOfPhishersRequest | phishingAttackExecutionHasLureMessageArrival | phishingAttackExecutionHasLureMessageDispatch | phishingAttackExecutionHasLureMessagePerception | phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation | phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning | phishingAttackProcessHasFraud | phishingAttackProcessHasPhishingAttackExecution | phishingAttackProcessHasPhishingAttackPlanning | phishingAttackProcessHasPhishingAttackPreparation | phishingAttackProcessHasPostAttackPhase | phishingEnablerParticipatedInPhishingAttackExecution | phishingTargetParticipatedInPhishingAttackExecution | postAttackPhaseHistoricallyDependsOnPhishingAttackExecution | requests | selects | targetAssetParticipatedInFulfillmentOfPhishersRequest | targetFragilityInheresInPhishingTarget | targetFragilityManifestedInFulfillmentOfPhishersRequest | targetTrustHasBelief | targetTrustHasIntention | targetTrustInheresInPhishingTarget | targetTrustManifestedInTrustBasedAction | usedIn
Dataatype Properties: | asset_name | asset_type | attachments_count | body | date_of_birth | gender | highest_education_level | hook_impersonated_agent | impersonated_agent_name | importance_level | lure_email_campaign | lure_impersonated_agent | nationality | online | organization_name | person_name | received_at | recipient | sender | sent_at | status | subject | webpage_url | weight
"In UFO-C, there is a distinction between Agentive and Non-agentive substantial particulars: respectively, Agents and Objects. Agents can be physical (e.g., a person) or social (e.g., an organization, a society). Objects can also be further categorized in physical and social objects.Physical objects include a book, a tree, a car. Social objects include money, language and Normative Descriptions. A normative description defines one or more rules or norms recognized by at least one social agent and that can define nominal universals such as social moment universals (e.g., social commitment types), social objects (the crown of the king of Spain) and social roles such as president, prime minister, PhD candidate or pedestrian. Examples of normative descriptions include the Italian Constitution, the University of Twente PhD program regulations, but also a set of directives on how to perform some actions within an organization (a description of a plan). Agents are substantials that can bear special kinds of moments named Intentional Moments. Intentionality should be understood in a much broader context than the notion of “intending something”, but as the capacity of some proper-ties of certain individuals to refer to possible situations of reality. Guizzardi, G., de Almeida Falbo, R. and Guizzardi, R.S., 2008, February. Grounding software domain ontologies in the unified foundational ontology (ufo): the case of the ode software process ontology. In CIbSE (pp. 127-140)."@e
| label: | Agent"@e |
|---|---|
| identifier: | http://papo.com#Agent |
| stereotype: | gufo:Category |
| supertypes: | gufo:FunctionalComplex |
| subtypes: | :Phisher :Person :ImpersonatedReputableAgent :Organization |
| in range of: | :aimsToImpersonate |
In UFO-C, a belief is an Intentional Moment that inheres in an Agent. It can be justified or frustrated by situations."@e
| label: | Belief"@e |
|---|---|
| identifier: | http://papo.com#Belief |
| stereotype: | gufo:Kind |
| supertypes: | gufo:IntrinsicMode |
| in domain of: | :beliefInheresInPhishingTarget |
| in range of: | :influences :targetTrustHasBelief |
| label: | Complacency"@e |
|---|---|
| identifier: | http://papo.com#Complacency |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
| label: | Curiosity"@e |
|---|---|
| identifier: | http://papo.com#Curiosity |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
| label: | Desire to Please"@e |
|---|---|
| identifier: | http://papo.com#DesireToPlease |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
| label: | Distraction"@e |
|---|---|
| identifier: | http://papo.com#Distraction |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
| label: | Email"@e |
|---|---|
| identifier: | http://papo.com#Email |
| stereotype: | gufo:Kind |
| supertypes: | gufo:FunctionalComplex |
| subtypes: | :LureEmail |
| in domain of: | :sender :recipient :subject :body :sent_at :received_at :attachments_count |
| label: | Fear"@e |
|---|---|
| identifier: | http://papo.com#Fear |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
Successful Phishing Attack Executions enable different Frauds. The latter include Extortion and Identity Theft. Fraud is a criminal event enabled by a successful Phishing Attack Execution. So, Fraud is not part of a Phishing Attack Execution but it may compose a Phishing Attack Process."@e
| label: | Fraud"@e |
|---|---|
| identifier: | http://papo.com#Fraud |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in domain of: | :fraudHistoricallyDependsOnPhishingAttackExecution |
| in range of: | :phishingAttackProcessHasFraud |
An event wherein a Target answers the Phisher's request. The exact form of this answer depends on the type of phishing attack. So, this event can generalize at least three others: (a) Malware-based attack; (b) Target replies Phisher with requested asset; (c) Webpage-based attack. Fulfillment of Phisher's Request corresponds to what is known as "falling for a phishing attack"."@e
| label: | Fulfillment of Phisher's Request"@e |
|---|---|
| identifier: | http://papo.com#FulfillmentOfPhishersRequest |
| stereotype: | gufo:EventType |
| supertypes: | :TrustBasedAction |
| in domain of: | :fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception |
| in range of: | :phishingAttackExecutionHasFulfillmentOfPhishersRequest :targetFragilityManifestedInFulfillmentOfPhishersRequest :targetAssetParticipatedInFulfillmentOfPhishersRequest :facilitates |
| label: | Greed"@e |
|---|---|
| identifier: | http://papo.com#Greed |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
According to Markus Jakobsson, the hook often consists of a website that emulates the appearance of a reputable agent, such as Microsoft's login website. The goal of the hook is for victims to be directed to it via the lure message and for the victims to disclose confidential information in it."@e
| label: | Hook Webpage"@e |
|---|---|
| identifier: | http://papo.com#HookWebpage |
| stereotype: | gufo:Role |
| supertypes: | :PhishingEnabler :PhishingParticipantTrustee :Webpage |
| in domain of: | :hook_impersonated_agent :requests |
| in range of: | :forawardsTo |
| label: | Hurry"@e |
|---|---|
| identifier: | http://papo.com#Hurry |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
| label: | Ignorance"@e |
|---|---|
| identifier: | http://papo.com#Ignorance |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
An Agent impersonated by the Phisher. It is very often a company or an organization previously trusted by the Phishing Target."@e
| label: | Impersonated Reputable Agent"@e |
|---|---|
| identifier: | http://papo.com#ImpersonatedReputableAgent |
| stereotype: | gufo:Role |
| supertypes: | :Agent :PhishingParticipantTrustee |
| in domain of: | :impersonated_agent_name |
| in range of: | :impersonated |
| label: | Individual Phisher"@e |
|---|---|
| identifier: | http://papo.com#IndividualPhisher |
| stereotype: | gufo:Role |
| supertypes: | :Phisher :Person |
Influence is a relator that aggregates Intrinsic Aspects that affect the formation of Beliefs. Its attribute weight describes the degree of this effect. Amaral, G., Sales, T.P., Guizzardi, G. and Porello, D., 2021. Ontological foundations for trust management: extending the reference ontology of trust. In CEUR workshop proceedings (Vol. 2835, pp. 12-22). Rheinisch Westfälische Technische Hochschule."@e
| label: | Influence"@e |
|---|---|
| identifier: | http://papo.com#Influence |
| stereotype: | gufo:Kind |
| supertypes: | gufo:Relator |
| in domain of: | :weight :influences |
| label: | Innocence"@e |
|---|---|
| identifier: | http://papo.com#Innocence |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
In UFO-C, Intentions are desired state of affairs for which the agent commits at pursuing (internal commitment) (e.g., the Intention of going to a beach resort for the next summer break). For this reason, intentions cause the agent to perform Actions. The propositional content of an Intention is a Goal. The precise relation between an intentional moment and a situation is the following: situation in reality can satisfy the propositional content of an intentional moment (i.e., satisfy - in the logical sense – the proposition representing that propositional content). Guizzardi, G., de Almeida Falbo, R. and Guizzardi, R.S., 2008, February. Grounding software domain ontologies in the unified foundational ontology (ufo): the case of the ode software process ontology. In CIbSE (pp. 127-140)."@e
| label: | Intention"@e |
|---|---|
| identifier: | http://papo.com#Intention |
| stereotype: | gufo:Kind |
| supertypes: | gufo:IntrinsicMode |
| in domain of: | :intentionInheresInPhishingTarget |
| in range of: | :targetTrustHasIntention |
| label: | Loneliness"@e |
|---|---|
| identifier: | http://papo.com#Loneliness |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
| label: | Lure Email"@e |
|---|---|
| identifier: | http://papo.com#LureEmail |
| stereotype: | gufo:Role |
| supertypes: | :LureMessage :Email |
| in domain of: | :lure_email_campaign :forawardsTo |
A Message that plays the role of luring and tricking Phishing Targets to obtain Target Asset. Lure Message sends Trust Calibration Signals based on its content, such as a company logo. Examples include e-mails, SMS, direct message on social media, etc."@e
| label: | Lure Message"@e |
|---|---|
| identifier: | http://papo.com#LureMessage |
| stereotype: | gufo:RoleMixin |
| supertypes: | :PhishingParticipantTrustee |
| subtypes: | :LureEmail |
| in domain of: | :lure_impersonated_agent :usedIn :dispatchedTo :lureMessageParticipatedInPhishingAttackExecution :discusses |
An event wherein a Lure Message arrives to the Target via whatever medium is used."@e
| label: | Lure Message Arrival"@e |
|---|---|
| identifier: | http://papo.com#LureMessageArrival |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in domain of: | :lureMessageArrivalHistoricallyDependsOnLureMessageDispatch |
| in range of: | :lureMessagePerceptionHistoricallyDependsOnLureMessageArrival :phishingAttackExecutionHasLureMessageArrival |
An event wherein a Phisher sends a Lure Message by some means, such as sending an email, SMS, a direct message on a social network, or making a phone call. It necessarily composes a Phishing Attack Execution."@e
| label: | Lure Message Dispatch"@e |
|---|---|
| identifier: | http://papo.com#LureMessageDispatch |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in range of: | :lureMessageArrivalHistoricallyDependsOnLureMessageDispatch :phishingAttackExecutionHasLureMessageDispatch |
An event wherein a Phishing Target somehow perceives a Lure Message. For example, by reading an email."@e
| label: | Lure Message Perception"@e |
|---|---|
| identifier: | http://papo.com#LureMessagePerception |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in domain of: | :lureMessagePerceptionHistoricallyDependsOnLureMessageArrival |
| in range of: | :fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception :phishingAttackExecutionHasLureMessagePerception |
In UFO-C, Intentions are a type of Intentional Aspect, along with beliefs and desires. However, there are other types of Intentional Aspects.Philosophers, psychologists, and cognitive scientists call them "mental attitudes'' or "propositional attitudes''. Attitude reports are sentences concerning cognitive relations people bear to propositions. Just like we can believe, desire, and intend, we can also know, learn, regret, imagine, fear, wish, want, pretend, suppose, surmise, suspect, predict, speculate, doubt, prove, disprove, infer, expect, and so on. These are all propositional attitudes. There is a wide range of literature on what exactly they are and whether they even exist. See: https://iep.utm.edu/prop-ati/, https://plato.stanford.edu/entries/prop-attitude-reports/."@e
| label: | Mental Attitude"@e |
|---|---|
| identifier: | http://papo.com#MentalAttitude |
| stereotype: | gufo:Kind |
| supertypes: | gufo:IntrinsicMode |
| subtypes: | :TargetFragility :Innocence :Loneliness :Complacency :Greed :Urgency :Fear :DesireToPlease :Ignorance :Hurry :Curiosity :Distraction |
| label: | Organization"@e |
|---|---|
| identifier: | http://papo.com#Organization |
| stereotype: | gufo:Kind |
| supertypes: | :Agent |
| subtypes: | :PhisherOrganization |
| in domain of: | :organization_name :status |
Human being. Any member of Homo sapiens, unique extant species of the genus Homo. A subtype of physical agent"@e
| label: | Person"@e |
|---|---|
| identifier: | http://papo.com#Person |
| stereotype: | gufo:Kind |
| supertypes: | :Agent |
| subtypes: | :PhishingTarget :IndividualPhisher |
| in domain of: | :person_name :gender :nationality :date_of_birth :highest_education_level |
| in range of: | :aimsToTrick |
An Agent that participates in a Phishing Attack Process by being the actor of the Phishing Attack Planning, Preparation, and Execution."@e
| label: | Phisher"@e |
|---|---|
| identifier: | http://papo.com#Phisher |
| stereotype: | gufo:Role |
| supertypes: | :Agent |
| subtypes: | :IndividualPhisher :PhisherOrganization |
| in domain of: | :carriedOut :made :executed :impersonated |
| in range of: | :designedBy :phishingAttackCapabilityInheresInPhisher |
| label: | Phisher Organization"@e |
|---|---|
| identifier: | http://papo.com#PhisherOrganization |
| stereotype: | gufo:Role |
| supertypes: | :Phisher :Organization |
Capabilities whose manifestations are the events of a Phishing Attack Execution."@e
| label: | Phishing Attack Capability"@e |
|---|---|
| identifier: | http://papo.com#PhishingAttackCapability |
| stereotype: | gufo:RoleMixin |
| supertypes: | gufo:IntrinsicMode |
| in domain of: | :acquiredThrough :phishingAttackCapabilityInheresInPhisher :phishingAttackCapabilityManifestedInPhishingAttackExecution |
A successful Phishing Attack Execution (or a phishing incident) is an event composed by at least four others in a temporal order: (a) Lure Message Dispatch (by the Phisher), (b) Lure Message Arrival, (c) Phishing Target perceives Lure Message, (d) Target answers the Phisher's request. Failed attempts of Phishing Attack Execution must have at least the first event (Phisher dispatches Lure Message). Phishing Attack Execution describes what is commonly considered a phishing attack and its basic steps."@e
An event wherein a Phisher creates a Phishing Plan and makes important decisions for the rest of the Phishing Attack Process, such as deciding impersonated agent, fraud type, attack method, attack goal, targets, communication medium, etc."@e
| label: | Phishing Attack Planning"@e |
|---|---|
| identifier: | http://papo.com#PhishingAttackPlanning |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in range of: | :phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning :phishingAttackProcessHasPhishingAttackPlanning :createdBy :made |
Phishing Attack Preparation is an event wherein a Phisher proceeds with necessary preparations for the Phishing Attack Execution. This means the Phisher acquires threatening capabilities for the attack execution, such as knowledge and tools (for example, phishing kits)."@e
| label: | Phishing Attack Preparation"@e |
|---|---|
| identifier: | http://papo.com#PhishingAttackPreparation |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in domain of: | :phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning |
| in range of: | :phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation :phishingAttackProcessHasPhishingAttackPreparation :acquiredThrough |
PAPO describes a Phishing Attack Process as a complex event that is necessarily composed of planning, preparation, and execution with optional subsequent fraud and post-attack events. Phishing Attack Preparation is historically dependent on Phishing Attack Planning, and Phishing Attack Execution is historically dependent on Phishing Attack Preparation. This represents a temporal causal order of Threat Events and Loss Events. Although Fraud and Post-Attack Phase may not occur as part of a Phishing Attack Process, they are historically dependent on Phishing Attack Execution."@e
| label: | Phishing Attack Process"@e |
|---|---|
| identifier: | http://papo.com#PhishingAttackProcess |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in domain of: | :phishingAttackProcessHasPhishingAttackPlanning :phishingAttackProcessHasPhishingAttackPreparation :phishingAttackProcessHasPhishingAttackExecution :phishingAttackProcessHasFraud :phishingAttackProcessHasPostAttackPhase |
| in range of: | :carriedOut :experienced :usedIn :involvedIn :enabled |
A Phishing Enabler is an ancillary object that enables the Phishing Attack Execution. Hook webpages are examples of Phishing Enablers."@e
| label: | Phishing Enabler"@e |
|---|---|
| identifier: | http://papo.com#PhishingEnabler |
| stereotype: | gufo:RoleMixin |
| supertypes: | gufo:FunctionalComplex |
| subtypes: | :HookWebpage |
| in domain of: | :enabled :phishingEnablerParticipatedInPhishingAttackExecution |
| in range of: | :considers |
Phishing Participant Trustee generalizes Lure Message, Impersonated Reputable Agent, and Hook. It denotes the entities possibly trusted by the Phishing Target. A Trustee is the Agent or Object being trusted by an Agent for a given purpose, according to certain beliefs of this Agent (Trustor). Amaral, G., Sales, T.P., Guizzardi, G. and Porello, D., 2021. Ontological foundations for trust management: extending the reference ontology of trust. In CEUR workshop proceedings (Vol. 2835, pp. 12-22). Rheinisch Westfälische Technische Hochschule."@e
| label: | Phishing Participant Trustee"@e |
|---|---|
| identifier: | http://papo.com#PhishingParticipantTrustee |
| stereotype: | gufo:Category |
| supertypes: | gufo:FunctionalComplex |
| subtypes: | :HookWebpage :LureMessage :ImpersonatedReputableAgent |
| in range of: | :dependsOn |
A relational entity created by a Phishing Attack Planning mediating several entities that participates in a Phishing Attack Process."@e
| label: | Phishing Plan"@e |
|---|---|
| identifier: | http://papo.com#PhishingPlan |
| stereotype: | gufo:Kind |
| supertypes: | gufo:ExtrinsicMode |
| in domain of: | :createdBy :designedBy :aimsToImpersonate :aimsToTrick :aimsToCatch :employs :aimsToEnable :selects :considers |
An Agent that participates in a Phishing Attack Process by being targeted in a Phishing Plan and possibly participating in other events of the phishing attack process."@e
| label: | Phishing Target"@e |
|---|---|
| identifier: | http://papo.com#PhishingTarget |
| stereotype: | gufo:Role |
| supertypes: | :Person |
| in domain of: | :experienced :phishingTargetParticipatedInPhishingAttackExecution |
| in range of: | :intentionInheresInPhishingTarget :beliefInheresInPhishingTarget :dispatchedTo :targetFragilityInheresInPhishingTarget :targetTrustInheresInPhishingTarget |
Post-Attack Phase includes all events wherein a Phisher seeks to protect themselves against measures that can incriminate them, for example, by destroying evidence of a Phishing Attack Execution. Post-Attack Phase also includes the Phisher assessment of a Phishing Attack Execution."@e
| label: | Post-Attack Phase"@e |
|---|---|
| identifier: | http://papo.com#PostAttackPhase |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| in domain of: | :postAttackPhaseHistoricallyDependsOnPhishingAttackExecution |
| in range of: | :phishingAttackProcessHasPostAttackPhase |
A valuable object targeted by a Phishing Plan."@e
| label: | Target Asset"@e |
|---|---|
| identifier: | http://papo.com#TargetAsset |
| stereotype: | gufo:RoleMixin |
| supertypes: | gufo:FunctionalComplex |
| in domain of: | :asset_name :asset_type :importance_level :involvedIn :targetAssetParticipatedInFulfillmentOfPhishersRequest |
| in range of: | :aimsToCatch :requests :discusses |
A subtype of Vulnerability that inheres in a Phishing Target. It describes the intrinsic properties of a Target that make them fall for a phish. It includes ignorance, inexperience, prejudice or bias, conformity, intuitive judgment, low level of need for cognition, heuristics, mental shortcuts, laziness, curiosity, fear, habits, anger, excitement, tension, happiness, sadness, disgust, guilt, surprise, greed, lust, neuroticism, and many others."@e
| label: | Target Fragility"@e |
|---|---|
| identifier: | http://papo.com#TargetFragility |
| stereotype: | gufo:Role |
| supertypes: | :MentalAttitude :Vulnerability |
| in domain of: | :targetFragilityInheresInPhishingTarget :targetFragilityManifestedInFulfillmentOfPhishersRequest |
The Reference Ontology of Trust (ROT) defines Trust as a complex mental state of a Trustor Agent, composed of an Intention related to a goal, for the achievement of which he counts upon the Trustee, and a set of Beliefs about the Trustee and its behavior. Amaral, G., Sales, T.P., Guizzardi, G. and Porello, D., 2021. Ontological foundations for trust management: extending the reference ontology of trust. In CEUR workshop proceedings (Vol. 2835, pp. 12-22). Rheinisch Westfälische Technische Hochschule."@e
| label: | Target Trust"@e |
|---|---|
| identifier: | http://papo.com#TargetTrust |
| stereotype: | gufo:Kind |
| supertypes: | gufo:ExtrinsicMode |
| in domain of: | :targetTrustInheresInPhishingTarget :targetTrustHasIntention :targetTrustHasBelief :targetTrustManifestedInTrustBasedAction :dependsOn |
Events that are the manifestation of the Target Trust."@e
| label: | Trust-based Action"@e |
|---|---|
| identifier: | http://papo.com#TrustBasedAction |
| stereotype: | gufo:EventType |
| supertypes: | gufo:Event |
| subtypes: | :FulfillmentOfPhishersRequest |
| in range of: | :targetTrustManifestedInTrustBasedAction |
| label: | Urgency"@e |
|---|---|
| identifier: | http://papo.com#Urgency |
| stereotype: | gufo:SubKind |
| supertypes: | :MentalAttitude |
Vulnerabilities are dispositions whose manifestations are undesired events, as in “the fragility of my phone's screen material makes it susceptible to breaking”. Sales, T.P., Baião, F., Guizzardi, G., Almeida, J.P.A., Guarino, N. and Mylopoulos, J., 2018. The common ontology of value and risk. In Conceptual Modeling: 37th International Conference, ER 2018, Xi'an, China, October 22–25, 2018, Proceedings 37 (pp. 121-135). Springer International Publishing."@e
| label: | Vulnerability"@e |
|---|---|
| identifier: | http://papo.com#Vulnerability |
| stereotype: | gufo:RoleMixin |
| supertypes: | gufo:IntrinsicMode |
| subtypes: | :TargetFragility |
| label: | Vulnerability Condition"@e |
|---|---|
| identifier: | http://papo.com#VulnerabilityCondition |
| stereotype: | gufo:SituationType |
| supertypes: | gufo:Situation |
| in domain of: | :facilitates |
| label: | Webpage"@e |
|---|---|
| identifier: | http://papo.com#Webpage |
| stereotype: | gufo:Kind |
| supertypes: | gufo:FunctionalComplex |
| subtypes: | :HookWebpage |
| in domain of: | :webpage_url :online |
| label: | acquired through"@e |
|---|---|
| identifier: | http://papo.com#acquiredThrough |
| domain: | :PhishingAttackCapability |
| range: | :PhishingAttackPreparation |
| label: | aims to catch"@e |
|---|---|
| identifier: | http://papo.com#aimsToCatch |
| domain: | :PhishingPlan |
| range: | :TargetAsset |
| label: | aims to enable"@e |
|---|---|
| identifier: | http://papo.com#aimsToEnable |
| domain: | :PhishingPlan |
| range: | :FraudType |
| label: | aims to impersonate"@e |
|---|---|
| identifier: | http://papo.com#aimsToImpersonate |
| domain: | :PhishingPlan |
| range: | :Agent |
| label: | aims to trick"@e |
|---|---|
| identifier: | http://papo.com#aimsToTrick |
| domain: | :PhishingPlan |
| range: | :Person |
| identifier: | http://papo.com#beliefInheresInPhishingTarget |
|---|---|
| domain: | :Belief |
| range: | :PhishingTarget |
| label: | carried out"@e |
|---|---|
| identifier: | http://papo.com#carriedOut |
| domain: | :Phisher |
| range: | :PhishingAttackProcess |
| label: | considers"@e |
|---|---|
| identifier: | http://papo.com#considers |
| domain: | :PhishingPlan |
| range: | :PhishingEnabler |
| label: | created by"@e |
|---|---|
| identifier: | http://papo.com#createdBy |
| domain: | :PhishingPlan |
| range: | :PhishingAttackPlanning |
| label: | depends on"@e |
|---|---|
| identifier: | http://papo.com#dependsOn |
| domain: | :TargetTrust |
| range: | :PhishingParticipantTrustee |
| label: | designed by"@e |
|---|---|
| identifier: | http://papo.com#designedBy |
| domain: | :PhishingPlan |
| range: | :Phisher |
| label: | discusses"@e |
|---|---|
| identifier: | http://papo.com#discusses |
| domain: | :LureMessage |
| range: | :TargetAsset |
| label: | dispatched to"@e |
|---|---|
| identifier: | http://papo.com#dispatchedTo |
| domain: | :LureMessage |
| range: | :PhishingTarget |
| label: | employs"@e |
|---|---|
| identifier: | http://papo.com#employs |
| domain: | :PhishingPlan |
| range: | :AttackMethod |
| label: | enabled"@e |
|---|---|
| identifier: | http://papo.com#enabled |
| domain: | :PhishingEnabler |
| range: | :PhishingAttackProcess |
| label: | executed"@e |
|---|---|
| identifier: | http://papo.com#executed |
| domain: | :Phisher |
| range: | :PhishingAttackExecution |
| label: | experienced"@e |
|---|---|
| identifier: | http://papo.com#experienced |
| domain: | :PhishingTarget |
| range: | :PhishingAttackProcess |
| label: | facilitates"@e |
|---|---|
| identifier: | http://papo.com#facilitates |
| domain: | :VulnerabilityCondition |
| range: | :FulfillmentOfPhishersRequest |
| label: | forawards to"@e |
|---|---|
| identifier: | http://papo.com#forawardsTo |
| domain: | :LureEmail |
| range: | :HookWebpage |
| identifier: | http://papo.com#fraudHistoricallyDependsOnPhishingAttackExecution |
|---|---|
| domain: | :Fraud |
| range: | :PhishingAttackExecution |
| identifier: | http://papo.com#fulfillmentOfPhishersRequestHistoricallyDependsOnLureMessagePerception |
|---|---|
| domain: | :FulfillmentOfPhishersRequest |
| range: | :LureMessagePerception |
| label: | impersonated"@e |
|---|---|
| identifier: | http://papo.com#impersonated |
| domain: | :Phisher |
| range: | :ImpersonatedReputableAgent |
| label: | influences"@e |
|---|---|
| identifier: | http://papo.com#influences |
| domain: | :Influence |
| range: | :Belief |
| identifier: | http://papo.com#intentionInheresInPhishingTarget |
|---|---|
| domain: | :Intention |
| range: | :PhishingTarget |
| label: | involved in"@e |
|---|---|
| identifier: | http://papo.com#involvedIn |
| domain: | :TargetAsset |
| range: | :PhishingAttackProcess |
| identifier: | http://papo.com#lureMessageArrivalHistoricallyDependsOnLureMessageDispatch |
|---|---|
| domain: | :LureMessageArrival |
| range: | :LureMessageDispatch |
| identifier: | http://papo.com#lureMessageParticipatedInPhishingAttackExecution |
|---|---|
| domain: | :LureMessage |
| range: | :PhishingAttackExecution |
| identifier: | http://papo.com#lureMessagePerceptionHistoricallyDependsOnLureMessageArrival |
|---|---|
| domain: | :LureMessagePerception |
| range: | :LureMessageArrival |
| label: | made"@e |
|---|---|
| identifier: | http://papo.com#made |
| domain: | :Phisher |
| range: | :PhishingAttackPlanning |
| identifier: | http://papo.com#phishingAttackCapabilityInheresInPhisher |
|---|---|
| domain: | :PhishingAttackCapability |
| range: | :Phisher |
| identifier: | http://papo.com#phishingAttackCapabilityManifestedInPhishingAttackExecution |
|---|---|
| domain: | :PhishingAttackCapability |
| range: | :PhishingAttackExecution |
| identifier: | http://papo.com#phishingAttackExecutionHasFulfillmentOfPhishersRequest |
|---|---|
| domain: | :PhishingAttackExecution |
| range: | :FulfillmentOfPhishersRequest |
| identifier: | http://papo.com#phishingAttackExecutionHasLureMessageArrival |
|---|---|
| domain: | :PhishingAttackExecution |
| range: | :LureMessageArrival |
| identifier: | http://papo.com#phishingAttackExecutionHasLureMessageDispatch |
|---|---|
| domain: | :PhishingAttackExecution |
| range: | :LureMessageDispatch |
| identifier: | http://papo.com#phishingAttackExecutionHasLureMessagePerception |
|---|---|
| domain: | :PhishingAttackExecution |
| range: | :LureMessagePerception |
| identifier: | http://papo.com#phishingAttackExecutionHistoricallyDependsOnPhishingAttackPreparation |
|---|---|
| domain: | :PhishingAttackExecution |
| range: | :PhishingAttackPreparation |
| identifier: | http://papo.com#phishingAttackPreparationHistoricallyDependsOnPhishingAttackPlanning |
|---|---|
| domain: | :PhishingAttackPreparation |
| range: | :PhishingAttackPlanning |
| identifier: | http://papo.com#phishingAttackProcessHasFraud |
|---|---|
| domain: | :PhishingAttackProcess |
| range: | :Fraud |
| identifier: | http://papo.com#phishingAttackProcessHasPhishingAttackExecution |
|---|---|
| domain: | :PhishingAttackProcess |
| range: | :PhishingAttackExecution |
| identifier: | http://papo.com#phishingAttackProcessHasPhishingAttackPlanning |
|---|---|
| domain: | :PhishingAttackProcess |
| range: | :PhishingAttackPlanning |
| identifier: | http://papo.com#phishingAttackProcessHasPhishingAttackPreparation |
|---|---|
| domain: | :PhishingAttackProcess |
| range: | :PhishingAttackPreparation |
| identifier: | http://papo.com#phishingAttackProcessHasPostAttackPhase |
|---|---|
| domain: | :PhishingAttackProcess |
| range: | :PostAttackPhase |
| identifier: | http://papo.com#phishingEnablerParticipatedInPhishingAttackExecution |
|---|---|
| domain: | :PhishingEnabler |
| range: | :PhishingAttackExecution |
| identifier: | http://papo.com#phishingTargetParticipatedInPhishingAttackExecution |
|---|---|
| domain: | :PhishingTarget |
| range: | :PhishingAttackExecution |
| identifier: | http://papo.com#postAttackPhaseHistoricallyDependsOnPhishingAttackExecution |
|---|---|
| domain: | :PostAttackPhase |
| range: | :PhishingAttackExecution |
| label: | requests"@e |
|---|---|
| identifier: | http://papo.com#requests |
| domain: | :HookWebpage |
| range: | :TargetAsset |
| label: | selects"@e |
|---|---|
| identifier: | http://papo.com#selects |
| domain: | :PhishingPlan |
| range: | :MessageMediumType |
| identifier: | http://papo.com#targetAssetParticipatedInFulfillmentOfPhishersRequest |
|---|---|
| domain: | :TargetAsset |
| range: | :FulfillmentOfPhishersRequest |
| identifier: | http://papo.com#targetFragilityInheresInPhishingTarget |
|---|---|
| domain: | :TargetFragility |
| range: | :PhishingTarget |
| label: | "@e |
|---|---|
| identifier: | http://papo.com#targetFragilityManifestedInFulfillmentOfPhishersRequest |
| domain: | :TargetFragility |
| range: | :FulfillmentOfPhishersRequest |
| identifier: | http://papo.com#targetTrustHasBelief |
|---|---|
| domain: | :TargetTrust |
| range: | :Belief |
| identifier: | http://papo.com#targetTrustHasIntention |
|---|---|
| domain: | :TargetTrust |
| range: | :Intention |
| identifier: | http://papo.com#targetTrustInheresInPhishingTarget |
|---|---|
| domain: | :TargetTrust |
| range: | :PhishingTarget |
| identifier: | http://papo.com#targetTrustManifestedInTrustBasedAction |
|---|---|
| domain: | :TargetTrust |
| range: | :TrustBasedAction |
| label: | used in"@e |
|---|---|
| identifier: | http://papo.com#usedIn |
| domain: | :LureMessage |
| range: | :PhishingAttackProcess |
| label: | asset_name"@e |
|---|---|
| identifier: | http://papo.com#asset_name |
| domain: | :TargetAsset |
| range: | xsd:string |
| label: | asset_type"@e |
|---|---|
| identifier: | http://papo.com#asset_type |
| domain: | :TargetAsset |
| range: | xsd:string |
| label: | attachments_count"@e |
|---|---|
| identifier: | http://papo.com#attachments_count |
| domain: | |
| range: | xsd:int |
| label: | body"@e |
|---|---|
| identifier: | http://papo.com#body |
| domain: | |
| range: | xsd:string |
xsd:date"@e
| label: | date_of_birth"@e |
|---|---|
| identifier: | http://papo.com#date_of_birth |
| domain: | :Person |
| label: | gender"@e |
|---|---|
| identifier: | http://papo.com#gender |
| domain: | :Person |
| range: | xsd:string |
| label: | highest_education_level"@e |
|---|---|
| identifier: | http://papo.com#highest_education_level |
| domain: | :Person |
| range: | xsd:string |
| label: | hook_impersonated_agent"@e |
|---|---|
| identifier: | http://papo.com#hook_impersonated_agent |
| domain: | :HookWebpage |
| range: | xsd:string |
| label: | impersonated_agent_name"@e |
|---|---|
| identifier: | http://papo.com#impersonated_agent_name |
| domain: | :ImpersonatedReputableAgent |
| range: | xsd:string |
| label: | importance_level"@e |
|---|---|
| identifier: | http://papo.com#importance_level |
| domain: | :TargetAsset |
| range: | xsd:string |
| label: | lure_email_campaign"@e |
|---|---|
| identifier: | http://papo.com#lure_email_campaign |
| domain: | :LureEmail |
| range: | xsd:string |
| label: | lure_impersonated_agent"@e |
|---|---|
| identifier: | http://papo.com#lure_impersonated_agent |
| domain: | :LureMessage |
| range: | xsd:string |
| label: | nationality"@e |
|---|---|
| identifier: | http://papo.com#nationality |
| domain: | :Person |
| range: | xsd:string |
| label: | online"@e |
|---|---|
| identifier: | http://papo.com#online |
| domain: | :Webpage |
| range: | xsd:boolean |
| label: | organization_name"@e |
|---|---|
| identifier: | http://papo.com#organization_name |
| domain: | :Organization |
| range: | xsd:string |
| label: | person_name"@e |
|---|---|
| identifier: | http://papo.com#person_name |
| domain: | :Person |
| range: | xsd:string |
xsd:dateTimeStamp"@e
| label: | received_at"@e |
|---|---|
| identifier: | http://papo.com#received_at |
| domain: |
| label: | recipient"@e |
|---|---|
| identifier: | http://papo.com#recipient |
| domain: | |
| range: | xsd:string |
| label: | sender"@e |
|---|---|
| identifier: | http://papo.com#sender |
| domain: | |
| range: | xsd:string |
xsd:dateTimeStamp"@e
| label: | sent_at"@e |
|---|---|
| identifier: | http://papo.com#sent_at |
| domain: |
| label: | status"@e |
|---|---|
| identifier: | http://papo.com#status |
| domain: | :Organization |
| range: | xsd:string |
| label: | subject"@e |
|---|---|
| identifier: | http://papo.com#subject |
| domain: | |
| range: | xsd:string |
| label: | webpage_url"@e |
|---|---|
| identifier: | http://papo.com#webpage_url |
| domain: | :Webpage |
| range: | xsd:string |
| label: | weight"@e |
|---|---|
| identifier: | http://papo.com#weight |
| domain: | :Influence |
| range: | xsd:int |