Any attempt by an unauthorized person to compromise the operation of a software program or networked system.