Watch this video on YouTube
An engineer is performing threat modeling. She is using a model that has "tampering with data" listed as one of the categories. Which model is this engineering using?