| http://www.w3.org/ns/prov#value | - Such successful penetration allows the unauthorized person to have access to a wide variety of system facilities which might otherwise not be available, as well as potentially allowing access to data and other information which would not normally be available.
|