Page 176

The University of SydneyPage 27Vulnerabilities and Threats–Modification–Hardware, Software, or Data is altered without authorisation–Altered software may perform additional computations–Changed hardware may modify data–Data can be modified in store or in transmission–Destruction–Hardware, Software, or Data is destroyed–Hardware may be destroyed by the environment–Software may be destroyed by malicious intent–Data may be destroyed by deletion, or failure of hardware/software