A company notices that its proprietary software code is available on the dark web. While investigating, they find out that an employee with access rights to the code repository was responsible. This situation is an example of:

  • Distributed Denial of Service (DDoS) Attack
  • Insider Threat
  • Phishing Attack
  • Ransomware Attack
This scenario is a classic example of an insider threat, where an employee with authorized access misuses their privileges, leading to a data breach.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *