An employee uses the following coding logic for the company’s resource access: String result = authenticate( . . . ) ; if(result.equals (ACCESS DENY) ) // do stuff after authentication fails e l s e // do stuff after authentication succeeds Suppose values returned by the authenticate function include ACCESS OK and ACCESS DENY. Is there a security flaw in the program? If so, explain and rewrite the code.
An employee uses the following coding logic for the company’s resource access: String result = authenticate( . . . ) ; if(result.equals (ACCESS DENY) ) // do stuff after authentication fails e l s e // do stuff after authentication succeeds Suppose values returned by the authenticate function include ACCESS OK and ACCESS DENY. Is there a security flaw in the program? If so, explain and rewrite the code.
Programming Logic & Design Comprehensive
9th Edition
ISBN:9781337669405
Author:FARRELL
Publisher:FARRELL
Chapter4: Making Decisions
Section: Chapter Questions
Problem 16RQ
Related questions
Question
An employee uses the following coding logic for the company’s resource access:
String result = authenticate( . . . ) ;
if(result.equals (ACCESS DENY) )
// do stuff after authentication fails
e l s e
// do stuff after authentication succeeds
Suppose values returned by the authenticate function include ACCESS OK and ACCESS DENY. Is
there a security flaw in the program? If so, explain and rewrite the code.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Programming Logic & Design Comprehensive
Computer Science
ISBN:
9781337669405
Author:
FARRELL
Publisher:
Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:
9781337508841
Author:
Carey
Publisher:
Cengage
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
Programming Logic & Design Comprehensive
Computer Science
ISBN:
9781337669405
Author:
FARRELL
Publisher:
Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:
9781337508841
Author:
Carey
Publisher:
Cengage
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT