Answer:
Attackers can exploit insufficient encryption by manipulating encryption processes to gain unauthorized access to transactional data and tamper with it.
Attackers can exploit insufficient encryption by manipulating encryption processes to gain unauthorized access to transactional data and tamper with it.
You may be interested in:
Web Security MCQs - PART 2