An attacker can perform actions that temporarily leave the owner without the control on the space resource. During this period the resource can be either under the control of the attacker or not. [1]
Standard/references: [2] [3]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.