226k views
5 votes
The transfer of classified proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications or media is a _____________.

A. Targeted Violence
B. Spill
C. Sabotage
D. Espionage

1 Answer

4 votes

Final answer:

The transfer of classified proprietary information to an unauthorized system is referred to as espionage. Espionage involves unauthorized acquisition or disclosure of confidential information.

Step-by-step explanation:

The transfer of classified proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications or media is referred to as espionage. Espionage involves the unauthorized acquisition or disclosure of confidential information for personal gain or to harm others.

Examples of espionage include hacking into systems to steal secret intelligence, causing disruption in satellite communications, disrupting networks, or spreading disinformation.

User Ben Drury
by
7.9k points