Answer: Corrupting
Explanation: Corrupting security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
7.9m questions
10.6m answers