In: Computer Science
Which of the following would be the MOST effective
countermeasure against malicious programming that rounds down
transaction amounts and transfers them to
the perpetrator’s account?
A. Ensure that proper controls exist for code review and release
management
B. Set up an agent to run a virus-scanning program across
platforms
C. Implement controls for continuous monitoring of middleware
transactions
D. Apply the latest patch programs to the production operating
systems
Correct Answer: A?????? or C??????
______________________
Note
■ Some experts claim that the correct answer is: "A. Ensure that proper controls exist for code review and release management"
■ Other experts claim that the correct answer is: "C. Implement controls for continuous monitoring of middleware transactions"
■ In my point of view, the best should be "A. Ensure that proper controls exist for code review and release management". For me the reply "C. Implement controls for continuous monitoring of middleware transactions" is "Mission Impossible!". A middleware should know the details of current accounts, rather than do its job as an intermediary over the parties. VERY STRANGE??!?!?!? OR NOT?!?!?!?!?
■ What do you think about that? Please explains: Why A and not C......or.......Why C and not A
Many thanks!
When someone uses a web application the defects in programming which is implemented on the client-side and server side can lead to vulnerabilities in websites. Now the client-side validations which are performed at the user browser are ineffective in preventing the attacks by an attacker since they can be easily bypassed by an attacker. The applications implement most of the validation at the client-side so that it provides good user experience and the server can also process requests faster as most of the computation is done at the client-side. To tackle this problem developers should alse verify the data submitted by the client at server-side for some malicious input. Doing this can prevent attack to some extent. So the option for the problem so should be (A). The other option (C) uses the middle ware which has other tasks to do and manage many things and also require tracking of users.