A database is hosting information assets with a computed CIA aggregate value of high. The
database is located within a secured network zone where there is flow control between the client
and datacenter networks. Which of the following is the MOST likely threat?
A.
Inappropriate administrator access
B.
Malicious code
C.
Internal business fraud
D.
Regulatory compliance