An attempt to bypass security controls on an IT system in order to compromise the data.
Topic
EA: Security Architecture
Security
An attempt to bypass security controls on an IT system in order to compromise the data.