Difference between revisions of "Peripheral Tampering"
Jump to navigation
Jump to search
(Created page with "{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" |- | '''1.''' Peripheral tampering involves any...") |
|||
Line 1: | Line 1: | ||
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" | {| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" | ||
|- | |- | ||
− | | '''1.''' | + | | '''1.''' Cyber criminals target the information assets associated with the main IT system of an organization, they do not target the main system directly. |
− | + | '''Note (1):''' Examples of such assets include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. | |
+ | {{Bcm Institute Source}} | ||
|} | |} | ||
Line 10: | Line 11: | ||
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> | <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> | ||
− | + | '''2.''' Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups. <br/> '''Source:''' (Verizon, 2016)<br/> | |
+ | <br/> | ||
[[Category:BCM Institute Cyber Security Glossary]] | [[Category:BCM Institute Cyber Security Glossary]] |
Revision as of 09:02, 24 August 2017
1. Cyber criminals target the information assets associated with the main IT system of an organization, they do not target the main system directly.
Note (1): Examples of such assets include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc.
|
2. Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups.
Source: (Verizon, 2016)