SOFTWARE AND APPLICATION SECURITY
Instructions
Validating the entry points of a website is essential, as invalidated input can result in a number of security threats. In this activity, you will analyze one such threat caused by improper input validation.This activity will address module outcome 2. Upon completion of this activity, you will be able to:Explain defensive measures to guard web applications against input attacks. (CO# 6)Respond to the following questions:State how the code below can be subjected to SQL Injection Attack to bypass the login mechanism.try {String sql = "SELECT * FROM employee WHERE username = '" + username.text + "' AND password = '" + pwd.text+ "'"; Statement stmt = con.createStatement(); ResultSet rs = stmt.executeQuery(sql); }Image of a login screen with a text box, with username, password, and a login buttonThe set of statements above are used for authenticating the user during the login process.Analyze the following SQL statement and state how the hacker can manipulate the given query to access confidential information from the website, such as users details (username, password, credit card details, etc.) from a simple select statement commonly used in the website search text box.Image of a search box for searching products in the websiteSelect * from items where item_name Like itemTextbox.text;Submit your answers in 2 to 3 page of a Word document with 100 words for each answer.Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. For those assignments that are not written essays and require uploading images or PowerPoint slides
Answer

Why we are Ranked the best
- Unlimited Revisions
- Free 24/7 Support and chat
- Money back guaranteed
- Low prices with discounts
- Experienced writers.
- Free Unlimited support