Your company recently had to layoff its system administrator (SA). The day after the SAs last day at exactly midnight, all the network servers deleted themselves. After a forensic analysis, the incident is traced back to malicious code planted by the laid-off SA. What term best describes this type of malware attack?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |