Answer: Corrupting
Explanation: Corrupting security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
9.1m questions
11.8m answers