Answer: Corrupting
Explanation: Corrupting security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
8.8m questions
11.4m answers