A cloud developer for an IoT service is storing billing information. Which of the following should be considered a common vulnerability in regard to this data that could be used to compromise privacy?
Option A is a legal requirement, not a vulnerability. I think the correct answer is B - lack of data retention policies. That could lead to sensitive information being kept longer than necessary, increasing the risk of a breach.
Dalene
2 days agoShenika
2 days agoTeri
3 days agoKarma
5 days agoWillodean
6 days agoElly
13 days ago