An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.

The intentional act of attempting to bypass one or more security services or controls of an information system.

 

Loading conversations.
Similar or Related Terms
Statistics
217
Characters
37
Words
17
Flesch Reading Ease
20.1
Flesch Kincaid Grade