A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?

Assets, Threats, and Vulnerabilities | Weekly challenge 1 Quiz | 

A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?

  • Threat
  • Procedure
  • Regulation
  • Vulnerability

 

Leave a Comment