In the Tim Lloyd logic bomb attack on Omega Engineering, what type of vulnerability was the existence of the user, "12345," an example of?
What will be an ideal response?
The existence of the user, "12345," was a backdoor.
Computer Science & Information Technology