A type of threat action whereby false data deceives an authorized entity. (See: active wiretapping, deception.)
A type of threat action whereby false data deceives an authorized entity. (See: active wiretapping, deception.)
Usage: This type of threat action includes the following subtypes: