Bypassing a normal process in order to gain advantage.
Examples include retail returns department employees entering false return
data in order to generate refund checks, use of computer networks to
generate additional checks after the legitimate checks have passed the last
integrity checks, and altering pricing records to reflect false inventory
levels to cover up thefts.
Complexity: This attack is often accomplished by a relatively
unsophisticated attacker using only knowledge gained while on the job. The
complexity of many such attacks is low, however, in the general case it may
be quite difficult to assure that no such attacks exist without a particular
level of collusion. Not formal analysis has been published to date.
fc@red.a.net