Keyword | Definition |
---|---|
authorised access | reading / changing data when you have permission to do so |
computer system | hardware and software |
hacking | Gaining unauthorised access to or control of a computer system |
unauthorised access | reading / changing data when you do not have permission |