A breach of the security rules for a system or service, such as:

  • attempts to gain unauthorised access to a system and/or data
  • unauthorised use of systems for the processing or storing of data
  • changes to a systems firmware, software or hardware without the system owners consent
  • malicious disruption and/or denial of service