Question: Process : SSAE 1 OWASPTop 1 0 Assessment _ E 1 _ SP SCAE 1 GWASPTCPTOAS Sections Question No . 2 1 A web application

Process : SSAE1 OWASPTop10 Assessment_E1_SP
SCAE1 GWASPTCPTOAS
Sections
Question No.21
A web application is using a weak encryption algorithm to store sensitive user data. An attacker gains access to the database and easily decrypts the data. What vulnerability is present?
SQL Injection
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
Insecure Cryptographic Storage
 Process : SSAE1 OWASPTop10 Assessment_E1_SP SCAE1 GWASPTCPTOAS Sections Question No.21 A

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!