An online newspaper suffered a data breach. The attackers exploited a vulnerability in the login form of their website. The attackers were able to access the newspaper’s user database, which did not encrypt personally identifiable information (PII).

Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz | 

An online newspaper suffered a data breach. The attackers exploited a vulnerability in the login form of their website. The attackers were able to access the newspaper’s user database, which did not encrypt personally identifiable information (PII).

What attack vectors did the malicious hackers use to steal user information? Select two answers.

  • The user database
  • The online login form
  • The newspaper’s website
  • The unencrypted PII

 

Leave a Comment