Malware that contains a backdoor is placed on a system that will later be used by the cybercriminal to gain access to the system. The cybercriminal was successful in which phase of the breach?
An employee has become disgruntled with their employer, a payroll software manufacturer, and one of the employees friends works for a competitor. The employee copies some highly- confidential source code to a USB drive and gives the USB drive to their friend after work. Which source(s) of a breach are involved in this scenario?