Problem
Select one common attack that could be launched on a database or Web application due to poor coding and describe the specifics of the attack, its methods, and the potential risks due to the poor coding practices.
Analyze the usefulness of firewall and router logs and why these potential sources of evidence are substantial enough to analyze?