« Back to Glossary IndexGaining unauthorized logical access to sensitive data by circumventing a system’s protections. Related Articles: Glossary: Computer Network DefenseGlossary: Cyber TeamsGlossary: CybersecurityGlossary: Pen Testing or Penetration Testing« Back to Glossary Index