Page 178

The University of SydneyPage 29Vulnerabilities and Threats–Fabrication–Spurious transactions are inserted into a network or records added to an existing database–Counterfeit objects placed in database by unauthorisedparties–May be difficult to distinguish between genuine and forged one–Phishing