Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. [1]
ID | Mitigation | Description |
---|---|---|
M2008 | MMU and MPU |