A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks. Which of the following would be best for the security manager to use in a threat model?
A. Hacktivists
B. White-hat hackers
C. Script kiddies
D. Insider threats
A. Hacktivists
B. White-hat hackers
C. Script kiddies
D. Insider threats