1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
6

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that

followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Computers and Technology
1 answer:
Korvikt [17]3 years ago
5 0

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

You might be interested in
Can someone tell me? I have an assignment in C++: I have to do three codes please tell me should i do them in one project or in
Nastasia [14]

Answer:

in my opinion if you have to do three codes in your C++ , you should of course do them in one project. but while submitting you should send the projects individually

6 0
3 years ago
What are node in a computer network​
BabaBlast [244]

Answer:

A node is a connection point inside a network that can receive, send, create, or store data. Each node requires you to provide some form of identification to receive access, like an IP address. A few examples of nodes include computers, printers, modems, bridges, and switches.

3 0
2 years ago
Who is the primary audience for demonstrations of game prototypes made by the developer?
padilas [110]

Answer:

the tester

Explanation:

When a video game is playable the first audience to test these prototypes are the tester, these people have to test all the game, and they have say all the information about errors, issues, bugs, and any difficulty to resolve these problems in a final video game's version, in this way the complete game arrives to the final audience.

5 0
3 years ago
What is a flowchart​
serious [3.7K]

a diagram of the sequence of movements or actions of people or things involved in a complex system or activity.

4 0
3 years ago
What's the difference between an operating system and an application software?​
Serjik [45]

Answer:

An operating system is something that controls the functions of an application software(app). The app does specific tasks for the end-user; the end user is someone who is, or is supposed to, use a product. The app uses API to request services from the operating system. If the user is interacting direct with software, it is an application software.

Explanation:

6 0
2 years ago
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • What natural boundary separated british territory from louisiana?
    7·1 answer
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • Why should you not perform any personal grooming task while driving?
    5·2 answers
  • Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using
    15·1 answer
  • What does the "zoom tool" do in Photoshop?
    15·2 answers
  • What are some of the opportunities that the stem program offers?
    15·1 answer
  • What are the characteristics of computer. Explain any one​
    15·2 answers
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!