An employee uses the following coding logic for the company’s resource access: String result = authenticate( . . . ) ; if(result.equals (ACCESS DENY) ) // do stuff after authentication fails e l s e // do stuff after authentication succeeds Suppose values returned by the authenticate function include ACCESS OK and ACCESS DENY. Is there a security flaw in the program? If so, explain and rewrite the code.

Programming Logic & Design Comprehensive
9th Edition
ISBN:9781337669405
Author:FARRELL
Publisher:FARRELL
Chapter4: Making Decisions
Section: Chapter Questions
Problem 16RQ
icon
Related questions
Question

An employee uses the following coding logic for the company’s resource access:

String result = authenticate( . . . ) ;

if(result.equals (ACCESS DENY) )

// do stuff after authentication fails

e l s e

// do stuff after authentication succeeds

Suppose values returned by the authenticate function include ACCESS OK and ACCESS DENY. Is

there a security flaw in the program? If so, explain and rewrite the code.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Linux
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Programming Logic & Design Comprehensive
Programming Logic & Design Comprehensive
Computer Science
ISBN:
9781337669405
Author:
FARRELL
Publisher:
Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:
9781337508841
Author:
Carey
Publisher:
Cengage
EBK JAVA PROGRAMMING
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT