CAPEC Details | |||||
---|---|---|---|---|---|
Name | Hardware Integrity Attack | ||||
| |||||
Summary | An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack. | ||||
Prerequisites | Influence over the deployed system at a victim location. | ||||
Solutions | |||||
Taxonomy: ATTACK |
|