A disgruntled employee with access to sensitive systems intentionally deletes key files, causing disruption to business operations. Which type of threat actor does this scenario describe?

Get more with Examzify Plus

Remove ads, unlock favorites, save progress, and access premium tools across devices.

FavoritesSave progressAd-free
From $9.99Learn more

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

The scenario describes an insider threat because it involves a current employee who has authorized access to sensitive systems and takes malicious action against the organization. Insider threats are particularly concerning because these individuals already possess the necessary knowledge and access to exploit vulnerabilities within the system, making their actions difficult to detect until damage has occurred. In this case, the disgruntled employee deliberately deletes key files, indicating their intention to disrupt operations from within the organization.

In contrast, hacktivists typically engage in cyber activities driven by political or social motives rather than personal grievances against their employers. Organized crime often involves more structured and collaborative groups focused on financial gain rather than individual actions arising from personal discontent. Competitors might engage in espionage or sabotage but wouldn't do so from within the organization or by utilizing legitimate access to systems. Thus, the defining factors of intentional harm by someone with internal access clearly align this scenario with an insider threat.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy