Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?
A. Data diddling
B. Skimming
C. Data corruption
D. Salami attack
Explanation:
Data diddling involves modifying data before or during systems data entry.