A security analyst observed the following activities in chronological order:
1. Protocol violation alerts on external firewall
2. Unauthorized internal scanning activity
3. Changes in outbound network performance
Which of the following best describes the goal of the threat actor?
gomet2000
Highly Voted 8 months, 3 weeks agoDrZoidBergsClaws
Most Recent 9 months agovoiddraco
9 months ago