Watch this video on YouTube
Which attack method involves modifying data as it enters a computer system?