Summary
Now that we’ve covered the Tampering suit from the Elevation of Privilege card deck, you should be familiar with the different types of tampering threats and what the design flaws might look like that leave you open to these threats in a software design.
Tampering can often have serious consequences and can allow an attacker to change settings or state information, giving them additional access rights or permissions so that they can perform some other action. As you work through this book, on occasion, you will see that there are blurred lines as to which category a threat might belong to. This is because threats are often linked, and one threat is made possible by the existence of another. How you classify these threats isn’t as important as detecting them and understanding their implications and how to protect against them.
Being able to recognize and mitigate tampering threats can help protect you from other threats that might have been possible as a...