Can a disgruntled designer currently employed by Vertika enable a competitor to gain access to confidential files – in particular, files that the disgruntled designer is authorised to access?
1 For this question, consider a solution where each of the devices approved by Vertika get an authentication token K, put on the device by Vertika’s IT department. Possession of this authentication token is a factor in authenticating to the cloud as an employee – the other part is a valid username and password. a) […]