Alan oversees the management of his team's web application. He has chosen to upload the application to a Github repository so that the company can easily access it from multiple cloud services as well as from developer laptops. Although he is doing so, Alan configures the repository as public, allowing world access to the files and configuration information. What type of threat is this?



Answer :

Other Questions