What is the term used to describe the unauthorized modification or deletion of data?
Spoofing
Alteration
Interception

Information Security Exercises are loading ...