Answer:
Attackers can tamper with data in a data store through unauthorized access, exploiting vulnerabilities or weak access controls.
Attackers can tamper with data in a data store through unauthorized access, exploiting vulnerabilities or weak access controls.
You may be interested in:
Web Security MCQs