If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
- Buffer overflow
- Race conditions
- Weaknesses in security practices
- Non-validated input
- Access control problems
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
Exam with this question: Introduction to Cybersecurity: Course Final Exam
Please login or Register to submit your answer