Watch this video on YouTube
Which scenario best describes a data integrity threat in computer security?