An IoT security practitioner should be aware of which common misconception regarding data in motion?
A hacker is attempting to exploit a known software flaw in an IoT portal in order to modify the site's administrative configuration. Which of the following BEST describes the type of attack the hacker is performing?