Security breach yields a database whose integrity is either:
Preserved (security violations are produced by unauthorized and unnoticed access for information purposes)
Corrupted (database access by computer viruses and by hackers whose actions are intended to destroy or alter data)