A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
Answer:
Computing cloud could fit in the website under the IT directory, with total access to all employees and shareholders.
Explanation: