Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application's data.
Which of the following secure application design principles was not met by the application in the above scenario?
kanchantanwani
Highly Voted 1 year, 4 months ago044f354
Most Recent 1 month, 3 weeks agojamiekji
7 months agoaman_baik
12 months agoAmesCB
1 year, 1 month agopepcyber
1 year, 1 month ago