Answer: Corrupting
Explanation: Corrupting security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
7.2m questions
9.6m answers