Attempting (with or without success) to gain unauthorised access to a computer system. This may be the unauthorised use of a computer or simply unauthorised access to particular programs or data stored on a computer.

Related terms

Term sub categories

Security
   general terms