A global technology firm detected unauthorized access to its proprietary designs for an upcoming product. The intruders
Fantastic news! We've Found the answer you've been seeking!
Question:
A global technology firm detected unauthorized access to its proprietary designs for an upcoming product. The intruders remained undetected for an extended period and extracted a large volume of confidential data without disrupting the company's operations. This stealthy, longterm breach aimed at acquiring secret information aligns BEST with which type of threat motivation?
Related Book For
Accounting Information Systems
ISBN: 9780132871938
11th Edition
Authors: George H. Bodnar, William S. Hopwood
Posted Date: