Tampering: The act of deliberately altering or damaging a system or device without authorization. It is a common security concern, especially in the context of information technology, where tampering can lead to data breaches or loss of integrity. Examples include modifying a computer program to gain unauthorized access to a system or tampering with a security camera to disable its surveillance capabilities.
Categories: CC D5: Security Operations | CCSP D4: Cloud Application Security | CISM D3: Information Security Program | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D1: Security Concepts and Practices
Related Articles:
- thors-glossary-thorteaches-com
- Glossary: Wi-Fi Protected Access 2 (WPA2)
- Glossary: System integrity
- Glossary: STRIDE Model
- Glossary: Secure/Multipurpose Internet Mail Extensions (S/MIME)
- Glossary: RIPEMD-160 (Race Integrity Primitives Evaluation Message Digest)
- Glossary: Packet
- Glossary: Logical Security/Controls
- Glossary: Hardwired Key
- Glossary: Hashed Message Authentication Code (HMAC)