⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Consequence
Name
Category
Tags
(comma-separated)
Description
Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data. By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Adversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct Change Default File Association and Masquerading to cause a similar effect.
Save changes
Cancel