0 Comments
Answer: Corrupting
Explanation: Corrupting security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.