An SQL injection attack can be used to get access to confidential information such as ____ details. When a legitimate user inputs their name and password, the system sends an "SQL request" to the ____. With SQL injection, the attacker tries to insert ____ SQL commands into the ____ boxes, hoping that these commands will be carried out by the ____. The usual way to protect against this is for the server to ____ the information properly before the SQL request is formed.

1.4.2 SQL Injection

Rangliste

Visuel stil

Indstillinger

Skift skabelon

Gendan automatisk gemt: ?