corruption
A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)
Senses
(I)
A type of threat action that undesirably alters system operation by adversely modifying system functions or data. (See: disruption.)
Usage: This type of threat action includes the following subtypes:
- "Tampering": /corruption/ Deliberately altering a system's logic, data, or control information to interrupt or prevent correct operation of system functions. (See: misuse, main entry for "tampering".)
- "Malicious logic": /corruption/ Any hardware, firmware, or software (e.g., a computer virus) intentionally introduced into a system to modify system functions or data. (See: incapacitation, main entry for "malicious logic", masquerade, misuse.)
- "Human error": /corruption/ Human action or inaction that unintentionally results in the alteration of system functions or data.
- "Hardware or software error": /corruption/ Error that results in the alteration of system functions or data.
- "Natural disaster": /corruption/ Any "act of God" (e.g., power surge caused by lightning) that alters system functions or data. [FP031 Section 2]
References
- IETF RFC 4949 (Internet Security Glossary)Jan 06, 2026RFC 4949 — Internet Security Glossary (Version 2)https://www.rfc-editor.org/rfc/rfc4949.txtRFC 4949 is published by the IETF Trust and marked as "Distribution of this memo is unlimited". Verify IETF Trust copyright/licensing terms for reuse.Source: IETF RFC 4949 (rfc-editor.org).