Skip to content
SynAc
Term

corruption

A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)

Senses

(I)

A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)

Usage: This type of threat action includes the following subtypes:

  • "Tampering": /corruption/ Deliberately altering a system's logic, data, or control information to interrupt or prevent correct operation of system functions. (See: misuse, main entry for "tampering".)
  • "Malicious logic": /corruption/ Any hardware, firmware, or software (e.g., a computer virus) intentionally introduced into a system to modify system functions or data. (See: incapacitation, main entry for "malicious logic", masquerade, misuse.)
  • "Human error": /corruption/ Human action or inaction that unintentionally results in the alteration of system functions or data.
  • "Hardware or software error": /corruption/ Error that results in the alteration of system functions or data.
  • "Natural disaster": /corruption/ Any "act of God" (e.g., power surge caused by lightning) that alters system functions or data. [FP031 Section 2]
References
  • IETF RFC 4949 (Internet Security Glossary)Jan 06, 2026
    RFC 4949 — Internet Security Glossary (Version 2)
    https://www.rfc-editor.org/rfc/rfc4949.txt
    RFC 4949 is published by the IETF Trust and marked as "Distribution of this memo is unlimited". Verify IETF Trust copyright/licensing terms for reuse.
    Source: IETF RFC 4949 (rfc-editor.org).