An information security analyst on a threat-hunting team is working with administrators to create a hypothesis related to an internally developed web application.
The working hypothesis is as follows:
✑ Due to the nature of the industry, the application hosts sensitive data associated with many clients and is a significant target.
✑ The platform is most likely vulnerable to poor patching and inadequate server hardening, which expose vulnerable services.
✑ The application is likely to be targeted with SQL injection attacks due to the large number of reporting capabilities within the application.
As a result, the systems administrator upgrades outdated service applications and validates the endpoint configuration against an industry benchmark. The analyst suggests developers receive additional training on implementing identity and access management, and also implements a WAF to protect against SQL injection attacks. Which of the following BEST represents the technique in use?
Practice_all
Highly Voted 3 years, 9 months agoYeweja
Highly Voted 3 years, 10 months agofuzzyguzzy
Most Recent 5 months ago2Fish
2 years, 1 month agoNickDrops
2 years, 3 months agoSebatian20
1 year, 5 months agof3lix
2 years, 4 months agodavid124
2 years, 6 months agoamateurguy
2 years, 8 months agomiabe
2 years, 9 months agoSniipZ
3 years, 10 months ago