Donny Koh

6%
Flag icon
Numerous attacks focus on the violation of integrity. These include viruses, logic bombs, unauthorized access, errors in coding and applications, malicious modification, intentional replacement, and system back doors.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating