Name |
Hardware Integrity Attack |
|
Likelyhood of attack |
Typical severity |
Low |
High |
|
Summary |
An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack. |
Prerequisites |
Influence over the deployed system at a victim location. |
Solutions | |
Taxonomy: ATTACK |
Entry ID
|
Entry Name
|
1195.003 |
Supply Chain Compromise: Compromise Hardware Supply Chain |
1200 |
Hardware Additions |
|