« Back to Glossary Index
The unauthorized transfer of data from a device, database, network, etc., to a different device, database, network, or location.
« Back to Glossary IndexThink you can outsmart AI? Announcing ‘Behind The Mask’ – Our all-new cybercrime role-playing game | Play Now
The unauthorized transfer of data from a device, database, network, etc., to a different device, database, network, or location.
« Back to Glossary Index