Question: Consider the two vulnerabilities: Structured query language (SQL) injection and cross-site scripting. Complete the following: Research these topics, and find 2 examples of breaches for
Consider the two vulnerabilities: Structured query language (SQL) injection and cross-site scripting. Complete the following:
Research these topics, and find 2 examples of breaches for each.
- Provide a brief explanation in your own words for what these vulnerabilities entail.
- Summarize the breaches in terms of the damage to the businesses and the specifics of the attacks.
- What could have and should have been done to prevent the breaches?
- What could have and should have been done to mitigate the resulting damage?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
