Hacking refers to unauthorized access to an IT system, typically with the intent to disrupt, steal, or manipulate data. In this scenario, activists attacking an oil company's IT system as a protest falls under hacking because they are illegally breaking into the company’s digital infrastructure to make a statement.
Let’s analyze each option:
Option A: Tampering
Incorrect. Tampering refers to physically altering or interfering with a system (e.g., changing sensor readings in an oil rig), rather than attacking an IT system digitally.
Option B: Hacking
Correct.
The individuals are gaining unauthorized access to the company’s IT system.
This action is commonly associated with hacktivism, where hackers attack organizations for political or ideological reasons.
IIA Reference: Internal auditors assess cybersecurity threats, including hacking and unauthorized access risks. (IIA GTAG: Auditing Cybersecurity Risks)
Option C: Phishing
Incorrect. Phishing involves tricking individuals into revealing sensitive information (e.g., login credentials) through fraudulent emails or websites, but this scenario describes a direct attack on the IT system.
Option D: Piracy
Incorrect. Piracy typically refers to copyright infringement (e.g., unauthorized software use) rather than hacking an IT system.
Thus, the verified answer is B. Hacking.