While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the web application processes the order as a return instead of a purchase, and the attacker's account is credited with a large sum of money. Which practices would have prevented this exploit

Respuesta :

Baraq

Answer:

Implementing client side validation

Explanation:

Given that this type of attack is known as Integer Overflow, the best means or practices to prevent this kind of attack is " implementing client-side validation."

This is because implementing client-side validation assists to prevent the validation errors that will arise from the integer overflow thereby resulting in a reduction of the network and server load.

Hence, in this case, the correct answer is "Implementing the client-side validation."

After the data is sent, server-side validation occurs on the server. It is used to validate data before it is saved in a database or used by the application in any other way.

  • Whereas if data fails validation, a reply is sent to the client with the necessary adjustments.
  • Client-side validation is indeed an initial inspection and a key aspect of good user experience; identifying erroneous data on the client-side allows the user to fix it immediately.
  • When sending data to a server, make sure that almost all essential form controls are completed in the proper format.
  • It's defined as client-side form validation, so it guarantees that the data provided satisfies the requirements specified inside the control buttons.

The final answer is "Implementing client-side and server-side validation".

Learn more:

brainly.com/question/5003091