A server administrator is investigating a recent performance degradation issue on a critical file server. The investigation reveals that a former employee's account, which was not properly deprovisioned, was used to log in outside of business hours. System logs show that this account was used to access and delete several project directories before the user attempted to clear the security event logs. Which of the following security risks is most likely represented in this scenario?
The correct answer is 'Malicious insider threat'. This scenario describes an individual with authorized access (a former employee whose account was still active) intentionally causing harm. The actions of deleting files and clearing logs are deliberate and harmful, which are key characteristics of a malicious insider threat. An unintentional insider threat would involve an accident or mistake, not deliberate sabotage. Social engineering involves tricking someone to gain access, and while it can lead to an insider threat, the direct actions described here point to the insider threat itself as the primary risk. A backdoor is a covert method of bypassing authentication, whereas this scenario involves the use of legitimate (though improperly managed) credentials.