An organization has recently experienced a data breach where large amounts of personal data were compromised. As part of a post-incident review, the privacy technologist wants to analyze available data to understand what vulnerabilities may have contributed to the incident occurring. He learns that a key vulnerability had been flagged by the system but that detective controls were not operating effectively. Which type of web application security risk does this finding most likely point to?
Having default settings for information sharing and consent can be problematic because it may not accurately reflect a user's preferences. Users may not be aware of these default settings or may not understand their implications. This could result in personal information being shared without the user's explicit consent.
Melissa
3 months agoCherelle
4 months agoShantay
4 months agoValentin
4 months agoKandis
4 months agoTerrilyn
5 months agoRana
5 months agoAndree
5 months agoMadonna
5 months agoAleta
5 months agoLauna
5 months agoFrank
5 months agoZena
5 months agoAngella
5 months agoRonald
10 months agoWilda
10 months agoFloyd
9 months agoTess
9 months agoJanna
9 months agoSharee
10 months agoFallon
9 months agoMariann
9 months agoPhuong
9 months agoJacki
11 months agoJerry
9 months agoEura
9 months agoVincenza
9 months agoDenae
9 months agoBernardine
9 months agoMaia
10 months agoRoyal
10 months agoLettie
11 months agoHarris
11 months agoGiuseppe
11 months agoOdelia
11 months ago