Which of the following is BEST characterized by unauthorized modification of data before or during
systems data entry?

A.
Data diddling
B.
Skimming
C.
Data corruption
D.
Salami attack
Explanation:
Data diddling involves modifying data before or during systems data entry.