Assignment
The information technology (IT) team has designed a Web application database program, and it wants to know what vulnerabilities are present. You have determined that you will identify vulnerabilities through error message and code observation.
Complete the following:
• Describe the four categories of observing error messages: typical conditions with no error, typical conditions with typical error, injection conditions with no error, and inject conditions with injection-caused error.
• List 3 different methods to identify vulnerabilities within source code.
• Code inspection is a common practice in industry whereby a committee of senior programmers review and offer advice. What specific items should the committee members be looking for when considering vulnerabilities?