⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Consequence
Name
Category
Tags
(comma-separated)
Description
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data. By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool that will intercept and change information. The type of modificatio
Save changes
Cancel