During a penetration testing engagement for a financial institution, you have been tasked with evaluating the system's resilience against intentional data tampering. While monitoring the transaction processing system, which type of attack would be most effective for inducing errors or alterations in the data, potentially leading to financial discrepancies?
Network sniffing
Bit flipping attack
Resource exhaustion
Service interruption