Which of the following flaws refers to an application using poorly written encryption code to securely encrypt and store sensitive data…?

Today, most organizations would agree that their most valuable IT assets reside within
applications and databases. Most would probably also agree that these are areas that have
the weakest levels of security, thus making them the prime target for malicious activity from
system administrators, DBAs, contractors, consultants, partners, and customers.

Which of the following flaws refers to an application using poorly written encryption code to
securely encrypt and store sensitive data in the database and allows an attacker to steal or
modify weakly protected data such as credit card numbers, SSNs, and other authentication
credentials?

Today, most organizations would agree that their most valuable IT assets reside within
applications and databases. Most would probably also agree that these are areas that have
the weakest levels of security, thus making them the prime target for malicious activity from
system administrators, DBAs, contractors, consultants, partners, and customers.

Which of the following flaws refers to an application using poorly written encryption code to
securely encrypt and store sensitive data in the database and allows an attacker to steal or
modify weakly protected data such as credit card numbers, SSNs, and other authentication
credentials?

A.
SSI injection attack

B.
Insecure cryptographic storage attack

C.
Hidden field manipulation attack

D.
Man-in-the-Middle attack



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Shadow

Shadow

The correct answer is “B”

Naveen Kumar

Naveen Kumar

B is the right answer

alrooc

alrooc

“B” ECSAv8 Module 16 pg. 564