A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?
- improper access control
- an internal threat
- unencrypted devices
- hard copy
Explanation & Hint: Improper access control allows the exploitation of stolen or weak passwords to gain access to corporate data. |