___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
(a) Data-hack
(b) Data-stealing
(c) Database altering
(d) Data breach
I got this question in examination.
The question is from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security