A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:
- Cross-Site Scripting (XSS) Vulnerability
- Distributed Denial of Service
- Insider Threat
- Man-in-the-Middle (MitM) Attack
This scenario most likely represents an insider threat, where a trusted insider misuses their access privileges to harm the organization, in this case, by modifying data.
Loading...
Related Quiz
- An organization is looking to consolidate their server infrastructure to optimize resource usage and reduce costs. By implementing which type of virtualization can they achieve this?
- For a company implementing a Service-Oriented Architecture (SOA), which middleware component is vital for managing and routing messages between services?
- AWS's primary service for object storage is:
- In which cloud model does an organization exclusively own and maintain the cloud infrastructure?
- In the context of cloud deployment models, which type of cloud typically has a higher upfront cost due to infrastructure investments?