An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.
A. risk B. asset
C. attack D. vulnerability
C. attack
Computer Science & Information Technology