Your company recently had to layoff its system administrator (SA). The day after the SAs last day at exactly midnight, all the network servers deleted themselves. After a forensic analysis, the incident is traced back to malicious code planted by the laid-off SA. What term best describes this type of malware attack?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts