An attacker can perform actions that permanently leave the owner without the control on the space resource. The resource can be either under the control of the attacker or not, that can act to gain an illegitimate ownership on the resource, or to damage the legitimate owner. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.