< All Topics
Print

Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (information technology products) or services at any point during the life cycle.

Source: CNSSI 4009

Click to rate this post!
[Total: 0 Average: 0]
Previous Supply Chain
Next Supply Chain Risk Management
Table of Contents