Corruption of data


Description
Someone gains access to the communication equipment of the information system and corrupts transmission of information (by intercepting, inserting, destroying, etc.) or repeatedly attempts access until successful.
Owning organization
Validating JSON schema
Threats (provided by MONARC)
Creator
License
Creative Commons Zero v1.0 Universal
SHA 256 footprint
36c980e328ad5f875c07f52fbebf18429ff7312c89b05165446d8da04b001813

Related objects

Definition of the object
{
    "a": 0,
    "c": 0,
    "code": "MD23",
    "description": "Someone gains access to the communication equipment of the information system and corrupts transmission of information (by intercepting, inserting, destroying, etc.) or repeatedly attempts access until successful.",
    "i": 1,
    "label": "Corruption of data",
    "language": "EN",
    "theme": "Unauthorised actions",
    "uuid": "b402d584-4576-11e9-9173-0800277f0571"
}