✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
A hacker is able to obtain and alter the content of a database through sql injection attack. Which requirements of information security have been violated in this case?