_____________ can be described as criminal activity involvin…

_____________ can be described as criminal activity involving information technology infrastructure, including unauthorized asset destruction, file and software deletion, service attacks that result in deterioration, alteration, or suppression of computer data, and unauthorized use of devices.

Following someone with a badge reader in through a door, usi…

Following someone with a badge reader in through a door, using an authorized user’s identification and password to gain digital device access, and tapping into the terminal link of a user to cause the device to believe that both terminals are the same person are ways that can be used to gain access to restricted areas. These techniques are known as