____________________ is a way that unauthorized users can obtain sensitive information by making assumptions based on the database's reactions or query responses to nonsensitive queries.
Fill in the blank(s) with the appropriate word(s).
Inference
Computer Science & Information Technology
You might also like to view...
Plagiarism necessarily implies copyright infringement.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When a message is forwarded, the original message text is included in the message window.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology