Gaining unauthorized logical access to sensitive data by circumventing a system’s protections.
« Back to Glossary IndexGaining unauthorized logical access to sensitive data by circumventing a system’s protections.
« Back to Glossary IndexCyberlandia © 2024 All Rights Reserved