Michael, a software engineer, added a module to a banking customers code. The new module deposits small amounts of money into his personal bank account.
Michael has access to edit the code, but only code reviewers have the ability to commit modules to production. The code reviewers have a backlog of work, and are often willing to trust the software developers testing and confidence in the code.
Which technique is Michael most likely to engage to implement the malicious code?
doesntmatter991
1 year, 10 months ago