A network engineer discovers that a foreign government hacked one of the defense contractors in their home country and stole intellectual property. What is the threat agent in this situation?
What is the practice of giving an employee access to only the resources needed to accomplish their job?
Which metric is used to capture the level of access needed to launch a successful attack?
What is the difference between an attack vector and an attack surface?
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
Which event is user interaction?