Which of these is not a step followed by cyber-criminals in data breaching?
(a) Research and info-gathering
(b) Attack the system
(c) Fixing the bugs
(d) Exfiltration
I had been asked this question in semester exam.
My query is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security