Last Updated on August 11, 2021 by Admin 2
Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
- Outsider threats
- Social Engineers
- Insider threats
- Zombies