Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

Explain the following attacks:

a) SQL Injection
b) Man-in-the-middle attack
c) Replay attack
Briefly describe measures to overcome these 3 attacks

You might also like