Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application's data.
Which of the following secure application design principles was not met by the application in the above scenario?
kanchantanwani
Highly Voted 1 year, 6 months ago044f354
Most Recent 4 months, 1 week agojamiekji
9 months, 3 weeks agoaman_baik
1 year, 2 months agoAmesCB
1 year, 3 months agopepcyber
1 year, 3 months ago