A type of threat action whereby false data deceives an
authorized entity. (See: active wiretapping, deception.)
Usage: This type of threat action includes the following subtypes:
- "Substitution": Altering or replacing valid data with false
data that serves to deceive an authorized entity.
- "Insertion": Introducing false data that serves to deceive an
authorized entity.