A threat action that undesirably alters system operation by adversely modifying system functions or data.
« Back to Glossary Index
« Back to Glossary Index
A threat action that undesirably alters system operation by adversely modifying system functions or data.
« Back to Glossary Index
Comments are closed.