Your company recently had to layoff its system administrator (SA). The day after the SAs last day at exactly midnight, all the network servers deleted themselves. After a forensic analysis, the incident is traced back to malicious code planted by the laid-off SA. What term best describes this type of malware attack?
|Attacks, Threats, and Vulnerabilities|
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|