Which global trade is determined by the United States Federal Bureau of Investigation (FBI) to be smaller than the global market for illegally-obtained information, according to the Security Solutions 2.0 course.?
An employee has become disgruntled with their employer, a payroll software manufacturer, and one of the employees friends works for a competitor. The employee copies some highly-confidential source code to a USB drive and gives the USB drive to their friend after work. Which source(s) of a breach are involved in this scenario?
Malware that contains a backdoor is placed on a system that will later be used by the cybercriminal to gain access to the system. Which phase of the breach does this represent?
A cybercriminal is trying to get a foothold into an organization by exploiting a weakness in their web servers. What is the most common website vulnerability that cybercriminals can use?