Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to:. Broken access.
This has to do with all of the functions that are associated with a person that is in charge of the data in the organization.
Hackers may taken over the access of a sensitive information and use it for the wrong purposes.
Read more on computer access here:
https://brainly.com/question/7320816
#SPJ2