Select one common attack that could be launched on a database or Web application due to poor coding and describe the specifics of the attack, its methods, and the potential risks due to the poor coding practices.
- Analyze the usefulness of firewall and router logs and why these potential sources of evidence are substantial enough to analyze. Determine whether or not you believe traffic analysis with a sniffer is necessary with the proper acquisition of firewall and router logs and justify your answer.