An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?
A.
Man-in-the-middle attack
B.
Protocol analysis
C.
Privilege escalation
D.
Cross-site scripting