Modification

Overview

In an Information Security context, modification (or alteration) refers one of the four broad categories used to discuss attacks and threats. The actual or intended effect of an modification attack is to tamper with data, systems or other digital assets.

The specific results and underlying goals of modification vary widely.

Examples

  • DNS Cache Poisoning
  • STP Manipulation
  • Website defacement
  • Malware piggy-backing

Related Concepts

Attack Classifications

Information Security parlance often uses four major categories as a broad-stroke classification for attack patterns and threats. Modification is one of these categories. The others are:

  1. Interception
  2. Interruption
  3. Fabrication

Interrelationship with Security Models

Modification attacks generally target and undermine the Authenticity pillar of the CIA Triad security model and the Integrity and Authenticity pillars of the Parkerian Hexad security model.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.