A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.
Answers
Answered by
11
Answer:
Not Dynamic Analysis
Explanation:
Similar questions