Difference between revisions of "Peripheral Tampering"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
(Created page with "{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" |- | '''1.''' Peripheral tampering involves any...")
 
Line 1: Line 1:
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups.  
+
| '''1.''' Cyber criminals target the information assets associated with the main IT system of an organization, they do not target the main system directly.  
''' Source: ''' (Verizon, 2016)
+
'''Note (1):''' Examples of such assets include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc.  
 +
{{Bcm Institute Source}}
  
 
|}
 
|}
Line 10: Line 11:
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
  
 
+
'''2.''' Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups. <br/> '''Source:''' (Verizon, 2016)<br/>
 +
<br/>
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Revision as of 09:02, 24 August 2017

1. Cyber criminals target the information assets associated with the main IT system of an organization, they do not target the main system directly.

Note (1): Examples of such assets include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc.

(Source: Business Continuity Management Institute - BCM Institute)

A Manager's Guide to Business Continuity Management for Cyber Security Incident Response (2017) BUY!












 

2. Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups.
Source: (Verizon, 2016)