List different methods to identify vulnerabilities within


Assignment

The information technology (IT) team has designed a Web application database program, and it wants to know what vulnerabilities are present. You have determined that you will identify vulnerabilities through error message and code observation.

Complete the following:

• Describe the four categories of observing error messages: typical conditions with no error, typical conditions with typical error, injection conditions with no error, and inject conditions with injection-caused error.

• List 3 different methods to identify vulnerabilities within source code.

• Code inspection is a common practice in industry whereby a committee of senior programmers review and offer advice. What specific items should the committee members be looking for when considering vulnerabilities?

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: List different methods to identify vulnerabilities within
Reference No:- TGS02473174

Expected delivery within 24 Hours