1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
6

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that

followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Computers and Technology
1 answer:
Korvikt [17]3 years ago
5 0

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

You might be interested in
It is an island country; it fought against us in World War II; it is known for sushi.
aivan3 [116]

Answer:

The country is Japan

5 0
3 years ago
Read 2 more answers
1 punto
sergey [27]

Answer:

c Proceso productivo

Explanation:

3 0
3 years ago
What can a dimm use to hold data and amplify a signal just before the data is written to the module?
ioda
DIMM stands for Dual In-line Memory Module) .It is a module that contains one or several random access memory (RAM) chips on a small circuit board.
DIMM uses registers to hold data and amplify a signal just before the data is written to the module.<span>Today's DIMMs use a 64-bit data path.</span>
6 0
3 years ago
There are types of templates​
guajiro [1.7K]
You didn’t explain your question correctly so I can’t help you
3 0
3 years ago
What is the correct order of the phases of the software development process?
Damm [24]
Known as the 'software development life cycle,' these six steps include planning, analysis, design, development & implementation, testing & deployment and maintenance. Let's study each of these steps to know how the perfect software is developed.
8 0
3 years ago
Other questions:
  • What identifies available computers through the internet?
    14·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Why is it important to not get distracted while driving?
    13·2 answers
  • Once artwork is inserted into a placeholder, it can be moved around on a slide. True False
    9·1 answer
  • A thin red border indicates the active cell. (True or False)
    12·1 answer
  • Define artificial intelligence?​
    15·2 answers
  • True or false, USBs are slower than RAM.
    15·1 answer
  • Explain information technology ?
    10·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • These brainly bots need to stop!!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!