An intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data.
Source(s):
NIST SP 800-53 Rev. 5
from
CNSSI 4009-2015
CNSSI 4009-2015
[Superseded]
from
DHS Information Technology Sector Baseline Risk Assessment - Adapted