Skip navigation

A user acting with malicious intent to gain access to and compromise an information system.