A developer added code to a financial system designed to transfer money to a foreign bank account on a specific time and date. The code would activate only if human resources processed the developers termination papers. The developer implemented which of the following security threats?
A.
Logic bomb
B.
Rootkit
C.
Botnet
D.
Privilege escalation