Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity. What is the threat model for the SQL database?
I'm feeling pretty confident about this one. Based on the information provided, I believe the correct answer is option B - an attacker can read or change the data.
I think the best approach here is to consider the different ways an attacker could potentially compromise the database, like unauthorized access, data manipulation, or denial of service attacks.
Lashunda
5 months agoTiera
6 months agoLynelle
6 months agoKenneth
6 months agoPearly
6 months agoVerlene
6 months agoRonald
7 months agoVal
7 months agoLore
7 months agoThaddeus
7 months agoWhitney
7 months agoFrancis
7 months agoLavelle
7 months agoElenor
7 months agoGilberto
7 months agoElvis
2 years agoChaya
2 years agoAlita
2 years agoRobt
2 years agoBernadine
2 years agoMalika
2 years agoWenona
2 years agoJerry
2 years agoGail
2 years agoAlline
2 years agoEleni
2 years agoIsaac
2 years agoLeatha
2 years agoLuther
2 years agoMarva
2 years agoJoanna
2 years agoSue
2 years agoLucina
2 years agoEvelynn
2 years agoTashia
2 years agoEmmanuel
2 years ago