Question: Black Box Case Study A black-box case study. You may use assumptions, but don't forget to state/elaborate your assumptions in the answer. Say there is

 Black Box Case Study A black-box case study. You may use

Black Box Case Study A black-box case study. You may use assumptions, but don't forget to state/elaborate your assumptions in the answer. Say there is a very good and brilliant code like this: The code above is used to search and get data from products table according to a certain column and keyword. For example, if the inputs that a user are like this: query=Tata Bahasa column=product_name Then the program will search the products table and find every product which product_name value is equals to "Tata Bahasa". Another example, given the inputs like this: query 15000 column=price Then the program will search the products table and find every product which price is equals to 15000. In your opinion, given the limited information: a. Do you think there is an SQL Injection risk here? How and why? Please explain as clearly as possible. b. If you think the above code is prone to some vulnerabilities, please rewrite/refactor the code so that it is more secure. Also, create a short explanation on how you're fixing the issue

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!