In the ________ attack the user supplied input is used to construct a SQL request to retrieve information from a database.

Fill in the blank(s) with the appropriate word(s).

SQL injection

Computer Science & Information Technology

You might also like to view...

Each website has a unique HTML address and a corresponding unique domain name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

IRB stands for Interactive Ruby and is used to interactively submit Ruby statements for immediate processing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology