Gaining unauthorized logical access to sensitive data by circumventing a system’s protections.
« Back to Glossary Index
« Back to Glossary Index
Gaining unauthorized logical access to sensitive data by circumventing a system’s protections.
« Back to Glossary Index
Comments are closed.