Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?
A. Data diddling
B. Skimming
C. Data corruption
D. Salami attack
A. Data diddling
B. Skimming
C. Data corruption
D. Salami attack