Explanation includes
- counterfeit parts
- malicious code injection
- use of open-source hardware and/or software
- data leakage (either by error or industrial espionage)
- chain of custody tampering
- modifications to design components.
Teacher Resources:
Process/Skill Questions:
- What is risk?
- What is chain of custody, and why is it important?