Searching through data residue in a system to gain unauthorized knowledge of sensitive data.
« Back to Glossary Index
« Back to Glossary Index
Searching through data residue in a system to gain unauthorized knowledge of sensitive data.
« Back to Glossary Index
Comments are closed.