In an office environment, if an attacker gains access to a shared document and modifies its contents without permission, which type of security concern does this illustrate?
Denial of service
Unauthorized information alteration
Eavesdropping
Dumpster diving