|
|
|
SP-TE-36: Unauthorized changes or manipulation of information data records |
|
|
|
SP-TE-28: Infection from malware, worms or trojans |
|
|
|
SP-TE-23: Adversary in the middle attack or network traffic modification |
|
|
|
SP-TE-29: Web application attacks or code injection attack |
|
|
|
SP-TE-37: Compromise of confidential information or data breach |