In a recent security breach, an SQL injection attack was used to access sensitive data. The initial investigation should focus on the ________ used in the application.

  • Authentication protocols
  • Coding languages
  • Database queries
  • Encryption algorithms
The initial investigation should focus on the database queries used in the application. SQL injection attacks exploit vulnerabilities in the construction of database queries, allowing attackers to manipulate or retrieve sensitive data. Analyzing and securing the database queries is crucial in addressing and preventing such security breaches.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *