|1. Peripheral tampering refers to cyber criminals targeting the information assets associated with the main IT system of an organization, they do not target the main system directly.
Related Term: Conduit Devices
2. Peripheral tampering involves any tampering or physically manipulating a hardware device that connects to a computer system. These devices may include Personal Identification Number (PIN) Entry Devices (PEDs), scanners, printers, etc. Threat actors associated with altered payment card transaction devices typically involve organized crime groups.
Source: (Verizon, 2016)