Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Glossary > Tampering

What is Tampering?

Understanding Tampering

The deliberate altering of data or a system to cause harm or gain unauthorized access. Tampering involves the malicious modification of hardware software data or systems to compromise their integrity availability or intended function. This can include altering system configurations corrupting data modifying code or physically interfering with devices. Tampering controls are addressed in standards like ISO 27001 NIST SP 800-53 and various regulatory frameworks. Organizations prevent tampering through integrity monitoring tamper-evident seals physical security change management controls code signing and hardware security. For example a payment terminal manufacturer might implement multiple anti-tampering measures including tamper-responsive hardware that erases cryptographic keys if physical intrusion is detected tamper-evident seals that show visible damage if removed cryptographic verification of firmware and regular integrity checks of critical software components. Related terms Integrity Data integrity Tamper evidence Anti-tampering Hardware security Supply chain security Modification Code signing Change control.

Learn More About Tampering: