An organization has recently experienced a data breach where large amounts of personal data were compromised. As part of a post-incident review, the privacy technologist wants to analyze available data to understand what vulnerabilities may have contributed to the incident occurring. He learns that a key vulnerability had been flagged by the system but that detective controls were not operating effectively. Which type of web application security risk does this finding most likely point to?
Having default settings for information sharing and consent can be problematic because it may not accurately reflect a user's preferences. Users may not be aware of these default settings or may not understand their implications. This could result in personal information being shared without the user's explicit consent.
Melissa
5 months agoCherelle
5 months agoShantay
6 months agoValentin
6 months agoKandis
6 months agoTerrilyn
6 months agoRana
6 months agoAndree
7 months agoMadonna
7 months agoAleta
7 months agoLauna
7 months agoFrank
7 months agoZena
7 months agoAngella
7 months agoRonald
12 months agoWilda
12 months agoFloyd
10 months agoTess
11 months agoJanna
11 months agoSharee
1 year agoFallon
10 months agoMariann
10 months agoPhuong
11 months agoJacki
1 year agoJerry
10 months agoEura
10 months agoVincenza
11 months agoDenae
11 months agoBernardine
11 months agoMaia
11 months agoRoyal
12 months agoLettie
1 year agoHarris
1 year agoGiuseppe
1 year agoOdelia
1 year ago