A security analyst discovers that one of the web APIs is being abused by an unknown third party. Logs indicate that the third party is attempting to manipulate the parameters being passed to the API endpoint. Which of the following solutions would best help to protect against the attack?
ApplebeesWaiter1122
Highly Voted 1 year, 11 months agops1hacker
1 year, 3 months agoMortG7
Most Recent 1 year, 2 months ago