Use data integrity schemes to protect data from unauthorized modifications, or from unintentional corruptions due to noise or storage defects (hashing, check values, digital signatures). SDLS provides integrity protection on the transmitted data, with the computation of a MAC. [1]
Domain | ID | Name | Use | |
---|---|---|---|---|
T2014 | Backdoor Installation | |||
T2010 | Modification of On Board Control Procedures modification | |||
T1195 | Supply Chain Compromise |