Peripheral Tampering

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to: navigation, search
1. Peripheral tampering refers to cyber criminals targeting the information assets associated with the main IT system of an organization, they do not target the main system directly.

Related Term: Conduit Devices

(Source: Business Continuity Management Institute - BCM Institute)

A Manager's Guide to Business Continuity Management for Cyber Security Incident Response (2017) BUY!















 

2. Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups.
Source: (Verizon, 2016)