Which occurs when an individual or process acquires a higher level of privilege, or access, than originally intended.
Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity
the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct.