Ver:
Intervenir
con medios hábiles y, a veces, arteros, en la política, en el mercado, en la
información, etc., con distorsión de la verdad o la justicia, y al servicio de
intereses particulares.
http://www.getsafeonline.org/
An intentional
event resulting in modification of a system, its intended behavior, or data.
[CNSSI_4009:2010]
(I) Make an
unauthorized modification in a system that alters the system's functioning in a
way that degrades the security services that the system was intended to
provide. (See: QUADRANT. Compare: secondary definitions under
"corruption" and "misuse".) [RFC4949:2007]
(I) A
characteristic of a system component that provides passive protection against
an attack. (See: tamper.)
Usage: Usually
involves physical means of protection.
[RFC4949:2007]
(I) /threat
action/ See: secondary definitions under "corruption" and
"misuse". [RFC4949:2007]
To deliberately
alter a system's logic, data, or control information to cause the system to
perform unauthorized functions or services.
http://www.sans.org/security-resources/glossary-of-terms/
automatic action
taken by a cryptographic module when tamper detection has occurred [ISO-19790:2006]
the automatic
action taken by a cryptographic module when a tamper detection has occurred
(the minimum response action is the zeroization of plaintext keys and CSPs). [FIPS-140-2:2001]
Temas relacionados