1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
6

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that

followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Computers and Technology
1 answer:
Korvikt [17]3 years ago
5 0

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

You might be interested in
How do I find unwanted programs on my computer?
Nataliya [291]

To find unwanted programs on my computer, you can find them from either the start menu, setting, or control panel.

Regardless of how old or new your computer is, it will undoubtedly contain at least one program that you don't require. You might try a different site if you can't locate the method you're looking for because there are various ways to remove apps and programs. Be aware that some applications and programs are part of Windows and cannot be removed.

If a program is just not functioning as it should, you can try to repair it first.

  • From the Start menu, remove

Search for the app in the displayed list by selecting Start > All apps.

Select Uninstall by pressing and holding (or right-clicking) the application.

  • Remove in Settings

Start > Settings > Apps > Apps & features should be selected.

Locate the app you wish to uninstall, then choose More > Uninstall.

Please take note that not all apps can currently be removed from the Settings app.

Follow the uninstall instructions found in the Control Panel if you need assistance removing these apps.

  • Remove from the Control Panel

Enter Control Panel in the taskbar search box and choose it from the list of results.

program > programs and features.

Then choose to Uninstall or Uninstall/Change by pressing and holding (or right-clicking) on the software you wish to uninstall. then adhere to the on-screen instructions.

To learn more about Program click here:

brainly.com/question/24440921

#SPJ4

5 0
1 year ago
I need a explanation for this 02 question for a test I will have .
In-s [12.5K]
23. C

24. A

Medal me Plz!!
7 0
3 years ago
What should you do if your computer keeps shutting down while working?
Oliga [24]
D is the best answer hope this help my love

5 0
3 years ago
Read 2 more answers
9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
DaniilM [7]

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

8 0
4 years ago
2) What are two reasons we analyze algorithms?
Likurg_2 [28]
It’s a making sections about what algorithms to use
8 0
3 years ago
Read 2 more answers
Other questions:
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • Give 5 uses of software and hardware.
    15·1 answer
  • Match each task with the features necessary to complete the task
    10·1 answer
  • An algorithm written out in plain English statements is called __________.
    8·1 answer
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • Write a C++ program to find if a given array of integers is sorted in a descending order. The program should print "SORTED" if t
    14·1 answer
  • Describe the different non-printing characters,​
    11·1 answer
  • You defined a class and saved it as shoe.py.
    5·2 answers
  • I have this questions i need to make it in a report format pages of atleast 3 pages and maximum of 5 pages​
    7·1 answer
  • What is the purpose of a hyperlink in a presentation?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!