A lazy programmer at a startup was recently fired for sleeping at their cubicle. Angry about being fired and wanting revenge, the programmer accessed the admin panel the startups website using a method they previously programmed into the application before being fired. With access to the admin panel the former employee was able to delete user account from the database which caused a lot of issues for the company. Which of the following options best describes the methodology of the attack?
Threats, Attacks and Vulnerabilities | |
Technologies and Tools | |
Architecture and Design | |
Identity and Access Management | |
Risk Management | |
Cryptography and PKI |